Ask Dr. Intranet

Blass, Steve
May 2000
Network World;05/29/2000, Vol. 17 Issue 22, p47
Trade Publication
Replies to an inquiry on the installation of a firewall by a company planning to link to the Internet. Options of enterprise networks in placing firewalls; Key factors to consider when deciding to install a firewall.


Related Articles

  • Denial of service and the worm. Blum, Daniel // Network World;06/28/99, Vol. 16 Issue 26, p55 

    Examines ways of dealing with computer viruses that attack the computer networks of businesses. Types of damages caused by viruses on networks; Corporate capabilities to combat viruses; Layered defense required in containing viruses.

  • 'Net attacks to plague small and midsize firms. Legard, David // Network World;10/16/2000, Vol. 17 Issue 42, p108 

    Highlights the findings of a report on Internet security problems conducted by the market research firm Gartner Group. Prevalence of Internet attacks among firms that manage their own network security; Use of the Internet for non-electronic mail functions; Vulnerability of small and midsize firms.

  • NETSEC OFFERS FREE INTERNET PERIMETER ASSESSMENTS VIA WEB.  // Worldwide Videotex Update;May2001, Vol. 20 Issue 5, p5 

    Reports that NETSEC is offering free Internet perimeter assessments to businesses through its corporate Web site to enhance protection of information assets. Keys to securing corporate networks; Range of services offered by NETSEC's engineers.

  • my biggest data challenges.  // Marketing Week;10/14/2010, Vol. 33 Issue 42, p52 

    The author comments on the challenges experienced in implementing data security in companies in Great Britain.

  • Inside Cisco's global security operations. Bednarz, Ann // Network World;9/12/2011, Vol. 28 Issue 16, p10 

    The article focuses on the Security Intelligence Operations (SIO) of U.S. networking giant, Cisco Systems Inc. The author mentions that Cisco's SIO provides enterprise security threat information, vulnerability analysis and mitigation solution to its enterprise customers. She notes that Cisco...

  • PUTTING UP VIRUS FENCES. Chen, Anne // eWeek;06/19/2000, Vol. 17 Issue 25, p65 

    Discusses measures used by corporate information technology (IT) managers to build stronger defenses against electronic mail-borne viruses. Emergence of virus protection products that can proactively evaluate the behavior of code coming from the Internet; Establishment and enforcement of...

  • On with the show. Meall, Lesley // Accountancy;Oct2001, Vol. 128 Issue 1298, p64 

    This article discusses the growing need for online security among businesses in Great Britain. The need for notoriety is a powerful motivator, and hackers and viruses now pose the main threat to organizations and their information systems. Media hype, widespread Internet access, and the trend...

  • Security strategy checklist.  // Accountancy;Oct2001, Vol. 128 Issue 1298, p68 

    This article presents tips to reduce information security risks in business, such as designing appropriate security into all new business applications.

  • Are you Preventing Data Losses?  // Security: Solutions for Enterprise Security Leaders;Sep2009, Vol. 46 Issue 9, p16 

    The article reports on the study conducted by Ponemon Institute LLC regarding data protection in 2009. The study found out that there are 58% of companies which believe that data protection is crucial as part of their risk management, while 12% of companies are in doubt. The study also claimed...

  • Security Convergence - The Future can be found in the Past. Elliott, David // Security: Solutions for Enterprise Security Leaders;Mar2010, Vol. 47 Issue 3, p68 

    The article offers the author's insights on physical security and information technology (IT) security. He says that the physical security and IT security cannot be combined due to the decentralization of computing resources and the Voice Over Internet Protocol (VoIP). He cites that the two will...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics