Engaging The Infrastructure For Internal Security

Schneider, Herb
November 2006
Business Communications Review;Nov2006, Vol. 36 Issue 11, p48
Trade Publication
The article discusses the challenges in maintaining security in a complex computer network. The weaknesses of security devices used by themselves is presented. The author argues that security can be tightened by integrating the security system with the network infrastructure. In order for this to occur, the communications between the network and security devices need to be enabled and systems need to be able to understand and respond properly. Several approaches to integration are discussed and some examples are given. The key to integration is though open, standards-based messaging interfaces.


Related Articles

  • Cracking the Code. Taylor, Chris // Time;3/22/1999, Vol. 153 Issue 11, p60 

    Visits Extreme Hacking, one of a growing number of counterhacking courses that teach people the how-tos of cracking their own computer networks so they can better protect them. Why it is easy to crack computer codes; How the average computer gives too information about itself; Comments by...

  • Modeling and Analyzing of Workflow Authorization Management. Zhang Yi; Zhang Yong; Wang Weinong // Journal of Network & Systems Management;Dec2004, Vol. 12 Issue 4, p507 

    The administration of authorizations in an organization is a complex task. To ensure that tasks constituting the business processes are performed by authorized users, a proper authorization mechanism is required. Alturi and Huang have proposed a workflow authorization model and presented a...

  • DrayTek Vigor 2800VG.  // APC (Bauer Media Group);Jul2005, Vol. 25 Issue 7, p75 

    Evaluates the modem Vigor 2800VG from DrayTek. Utility of the USB port on the back of the modem; Simplicity of the user interface; Benefits of firewall compatibility.

  • Potential Wi-Fi Security Risks.  // Database & Network Journal;Feb2004, Vol. 34 Issue 1, p19 

    Anixter says that with security issues plaguing wireless local area network installations, organisations should be taking steps to mitigate possible threats much earlier on. Hazards include rogue access points, unauthorised eavesdropping and hacker attacks. A few simple steps can dramatically...

  • TREND MICRO STANDS GUARD WITH NETWORK VIRUSWALL 1200. Ohlhorst, Frank J. // CRN;5/17/2004, Issue 1096, p38 

    Evaluates Trend Micro's Network VirusWall 1200, an appliance-based solution deployed at the network edge. Capabilities of VirusWall 1200; Features of VirusWall; Components of Trend Micro's appliance.

  • SECURE AGAINST ROGUE DEVICES. Riciputi, Joel // Communications News;Jul2007, Vol. 44 Issue 7, p30 

    The article discusses computer security to protect against rogue devices. Discovering everything that is on the network, accurately classifying all of the devices, monitoring for changes, and providing automated remediation are key building blocks to helping organizations regain control and...

  • Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols. Junghyun Nam; Kim-Kwang Raymond Choo; Juryon Paik; Dongho Won // International Journal of Security & Its Applications;Mar2013, Vol. 7 Issue 2, p47 

    Protocols for password-based authenticated key exchange (PAKE) enable two or more parties communicating over a public network to build a secure communication channel using their easy-to-remember passwords. However, off-line dictionary attacks have always been a major security concern in...

  • BWM CAN AID SECURITY.  // Communications News;Sep2005, Vol. 42 Issue 9, p21 

    This article explains the advantages of using bandwidth management (BWM) in protecting computer networks. BWM gives network managers the upper hand against hackers because BWM throttles resources allocated to applications. By throttling applications, BWM effectively halts worm propagation and...

  • Putting the wraps on smelly phish. Dix, John // Network World;7/12/2004, Vol. 21 Issue 28, p34 

    Phishing is quickly becoming the single greatest threat to corporate efforts to serve consumers electronically, and with good reason. Undermining trust in online transactions could set the whole movement back years and negate the efficiency and cost gains that companies have realized. Several...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics