TITLE

Inside Out Security

AUTHOR(S)
Passmore, David
PUB. DATE
March 2006
SOURCE
Business Communications Review;Mar2006, Vol. 36 Issue 3, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on the implementation of network security to prevent network intruder from spreading computer viruses. It includes firewalls as one example of network security but realized it is not so much effective and hackers can try to sneak through the firewalls. The intrusion detection systems and the intrusion protection systems are both designed to give notice and protect the user if the hackers are trying to get into the network Another alternatives are developed to protect network from malware such as worms, viruses and trojans which includes Network Access Control from Cisco, Enterprise Infranet Controller from Juniper and NetScreen VPN from Enforcer.
ACCESSION #
20017247

 

Related Articles

  • Safety and Security on the Internet.  // World Almanac & Book of Facts;2004, p714 

    Discusses safety and security on the Internet. Basic security rules, such as using caution when giving out personal information; Computer viruses; Importance of installing antivirus software on computers; How protective firewall software guards against hacker attacks; Browsers which allow the...

  • Microsoft Security Enhancements. Smith, Randy Franklin // Windows IT Pro;Sep2005, Vol. 11 Issue 9, Special section p1 

    Provides computer security updates from Microsoft Corp. Release of security patches on the second Tuesday of each month; Tools and resources used by the company to upgrade computer security; Suggested virus protection software for each type of business.

  • Protecting Against Threats to Enterprise Network Security. Gellis, Harold C. // Software World;Mar2006, Vol. 37 Issue 2, p14 

    The article discusses threats to the security of computer networks and protection against them. Computer networks and the Internet has revolutionized the way vital sectors of the economy conduct their business. The advent of wireless and mobile devices has created a mobile society but the...

  • Juniper crams security tools into appliances. Lawson, Stephen // Network World;9/4/2006, Vol. 23 Issue 34, p23 

    The article reports on the plan of Juniper Networks Inc. to pack more security features into its firewalls and appliances for midsize businesses and branch offices. Juniper has released their anti-spam capability and their antivirus tool set that battles spyware, adware and phishing into he...

  • FORTIGATE SECURITY APPLIANCES ACHIEVE NSS CERTIFICATION.  // Computer Security Update;Dec2005, p1 

    This article reports that Fortinet Inc.'s FortiGate(TM)-3600 systems have passed rigorous unified threat management (UTM) testing by the NSS Group, a prestigious independent security testing facility. Fortinet is the market leader in UTM and only provider of ASIC-accelerated, network-based...

  • Combined firewall and intrusion detection system overcomes Brunel's spam problems. Savvas, Antony // Computer Weekly;4/27/2004, p46 

    Brunei University has bolstered its network security to protect itself from computer viruses and junk electronic mail. Brunei's network handles 38,000 e-mails a day and connects 12,000 students and 2,000 staff. It decided to stop e-mails being transferred across its local area network to avoid...

  • Personal firewalls. Johnson, Simon // Australian Personal Computer;Feb2005, Vol. 25 Issue 2, p60 

    The article presents information about various types of firewalls available. Firewalls are built into just about every Internet-enabled device one can imagine. If one buys an ADSL modem, a wireless router, even Windows XP, a firewall will be included. Broadband firewalls provide some protection,...

  • Strategies to beat the virus writers. Savage, Marcia // SC Magazine: For IT Security Professionals (UK Edition);Jan2004, p24 

    Presents strategies to beat the virus writers. Evolution of computer viruses; Importance of integration of technologies to achieve smarter solution; Speculations on spyware; Uses of signature-based detection according to Ian Hameroff, senior security strategist at Computer Associates;...

  • Increased mobile working means viruses may bypass normal security systems, unless IT managers tighten perimeter controls by introducing a system of quarantine. Butler, Paul // Computer Weekly;8/30/2005, p30 

    The article focuses on issues related to computer security. With threats to the corporate network on the increase, security is one of the biggest service disrupters facing systems administrators and network managers. Information technology (IT) managers frequently experience concerns regarding...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics