TITLE

HOW SECURE are Internet Connections?

AUTHOR(S)
Moss, John
PUB. DATE
April 2005
SOURCE
Security: Solutions for Enterprise Security Leaders;Apr2005 Supplement, Vol. 42, p20
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Shares the author's thoughts about Internet security systems. Solutions to the problem of sending data securely over the Internet; Utilization of a VPN connection; Advantages of using access control panels.
ACCESSION #
16701890

 

Related Articles

  • Putting the VoIP Fire Out. Dubois, Ronald // Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p68 

    The article examines the use of Voice over Internet Protocol (VoIP) in security management. Monitoring companies dub VoIP as risky since they have repercussions for legacy security systems. They also claim that VoIP does not allow the alarm panel to capture the phone line to signal the central...

  • 5 Questions For a Successful Deployments of an IP Video Solution. Mike Kuhn // SDM: Security Distributing & Marketing;Apr2009, Vol. 39 Issue 4, p78 

    The article presents questions and answers related Internet Protocol (IP) Video Solutions including information technology (IT) Department's Network standards, the importance of recorded video to clients and significance of scalability in a security system.

  • Execution in the Fog of War: Four Enterprise Security Challenges that Must be Addressed as Cyber War Combatants. Woerner, Ron; Elfering, David // Security: Solutions for Enterprise Security Leaders;Sep2014, Vol. 51 Issue 9, p72 

    The article discusses strategies for addressing cyber war within a corporate environment. It mentions the importance for security executives to establish the proper command and control for security, prioritizing largest security threats, and establishing a quick response plan. It also stresses...

  • Passwords - Keys to Your Life and Your Business. Lakhani, Veeral P.; Wright, Steve // SDM: Security Distributing & Marketing;Mar2006, Vol. 36 Issue 3, p65 

    The article suggests an easy way to remember complicated passwords for computer and Internet accounts. It discusses the creation of a password that is at least 11 characters long and includes letters, numbers and special characters. The article advises the creation of a pass phrase that would be...

  • Firms Struggle With Security, but MSSPs Can Help. Roos, Gina // Channel Insider;11/22/2016, p1 

    The article reports on the significant of managed security service providers (MSSPs) in managing the challenges facing by organizations related to cybersecurity. Topics discussed include the risk of cyber-attack on key hardware and software system, the several causes of cyber-attacks which...

  • Internet Security Systems Thwarts Cyber Attacks in Advance. Javier, Pedro Valle // Caribbean Business;7/21/2005, Vol. 33 Issue 28, p26 

    The article presents information about Internet Security Systems Inc. ISS is a company specialized in providing security products and services that pre-emptively protect enterprise organizations against Internet threats. In 1992, ISS's founder Christopher W. Klaus invented a revolutionary...

  • Reducing Internet-Based Intrusions: Effective Security Patch Management. Brykczynski, Bill; Small, Robert A. // IEEE Software;Jan/Feb2003, Vol. 20 Issue 1, p50 

    Examines eight key practices intrinsic to effective, systematic and repeatable patch management and proposes performance measures for evaluating it. Defense against Internet-based attacks; Key practices derived from industry pilot projects for improving patch management.

  • Access Control: Proprietary or Network? Gager, Russ // SDM: Security Distributing & Marketing;Feb2008, Vol. 38 Issue 2, p48 

    The article provides information on different levels of Internet protocol (IP) in the U.S. There are three levels of access control systems which include, the first generation access control that are proprietary to specific manufacturers and not interoperable. The second generation IP-based aces...

  • What Do We Need to Make IoT Security a Reality? OREBAUGH, ANGELA // Information Security;Oct2014, Vol. 16 Issue 8, p31 

    The article discusses how security professionals can improve Internet of Things (IoT) security as standards and security models emerge. Topics include factors attributed to poor IoT security, security practices that IoT devices should implement, including use of secure development practices,...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics