Configs Adding Up To Network Woes

Fest, Glen
May 2007
Bank Technology News;May2007, Vol. 20 Issue 5, p31
Trade Publication
The article discusses issues associated with firewall configuration problems in banks and credit unions in the U.S. According to a security assessment conducted in 2006 by Redspin Inc., most banks and credits unions have shortcomings in their firewall configurations and 77% of them are violating organizational security practices. Moreover, inattention to access control list interaction has been identified as the main culprit in the security audit glitches in banks and credit unions.


Related Articles

  • Five Ways CUs Can Thwart Cyberthreats. Kiley, Kevin // Credit Union Times;10/8/2014, Vol. 25 Issue 39, p10 

    The author discusses ways with which credit unions and other financial institutions can protect themselves from cybercrimes and other threats. He suggest ways which includes the creation of mandatory passwords for account, mobile devices, and information access to protect banking assets, use of...

  • First Horizon Using Tumbleweed. Wolfe, Daniel // American Banker;11/24/2004, Vol. 169 Issue 226, p14 

    Mentions First Horizon National Corp. uses the firewall software from California company, Tumbleweed Communications Corp. Use of the filtering software to protect its banks from computer viruses; Comments of First Horizon officials, Garry Anderson and Joe Fisher; Features of the software.

  • Build a firewall to protect your network. Mie-Yun Lee // Business Journal (Central New York);3/1/2002, Vol. 19 Issue 9, p16 

    Provides information on the importance of building a firewall to protect computer networks from hackers. Function of a firewall; Tips on installing a firewall; Risk of having a firewall installed.

  • Brainstorm reverses the proxy solution.  // Communications News;Jul2001, Vol. 38 Issue 7, p30 

    Discusses how the proxy server works when all pertinent information about customers, distributors and partners are all inside the firewall. How the data flow takes place; Architecture of the proxy server that provides levels of security.

  • Reduce firewall complexity. Muller, Nathan // Communications News;Jan2003, Vol. 40 Issue 1, p6 

    Suggests firewall for network security for businesses. Complexity of firewall operation; Benefits of carrier-managed firewall solution; Details on how a managed service works.

  • Firewall `racks up' security. Surkan, Michael // PC Week;1/13/97, Vol. 14 Issue 2, p45 

    Evaluates the PIX Firewall 3.0 from Cisco Systems Inc. Usability; Capability; Performance; Interoperability; Manageability; Pros and cons; Price information; Contact point.

  • Firewall Vulnerability and Network Protection for Streaming and Emerging EDP--Part 2 of 2.  // Information Executive;Jan/Feb2002, Vol. 6 Issue 1, p1 

    Part II. Discusses how the e-Border product family provides secure communication features to emerging streaming applications and management features to application users and network administrators. Ways to ensure user datagram protocol (UDP) communication; Role of the e-Border Server in...

  • FIREWALL FOLLIES. Garfinkel, Simson // Technology Review;Sep2002, Vol. 105 Issue 7, p33 

    Focuses on the concept of firewalls for computer networks which are installed by businesses to protect their networks from hackers and intruders. Inability of firewalls to protect networks against the damages insiders can inflict; Impact of firewalls on Internet accessibility; Advantages and...

  • VoIP vulnerability requires different security methods. Warren, Craig // Communications News;Nov2001, Vol. 38 Issue 11, p50 

    Discusses the security methods aimed to address the vulnerability of the voice-over-Internet protocol (VoIP) networks to hackers and denial-of-service attacks. Tasks of an enterprise network firewall; Hardware elements of an ideal firewall system; How the signaling elements of a VoIP network work.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics