TITLE

Securing The Campus: A Case Study

AUTHOR(S)
Dorsz, Jeff
PUB. DATE
October 2007
SOURCE
Business Communications Review;Oct2007, Vol. 37 Issue 10, p54
SOURCE TYPE
Trade Publication
DOC. TYPE
Case Study
ABSTRACT
The article presents a case study of how the South Orange County Community College District (SOCCCD) is taking steps to protect its computer network and data assets. Many institutions that have networks are facing the "dissolving perimeter" problem, which refers to the inability of traditional means, such as firewalls, virtual private network (VPN) gateways, and intrusion detection systems (IDS), to fully protect its internal network. The problem is particularly difficult to address in networks that allow access to a vast number of guests. The SOCCCD started to secure their datacenter by using segmentation and firewalls to build a perimeter around its datacenter. They also based their access policy on roles, such as student, faculty, and administrator.
ACCESSION #
27037097

 

Related Articles

  • Remote Access Strategies for Process Control / SCADA Networks. Nicholson, Todd // Remote Site & Equipment Management;Feb/Mar2008, Vol. 8 Issue 1, p16 

    The article presents a case which demonstrated the successful deployment of a security solution using Industrial Defender Inc. technology to support a Remote Access Solution in a converging corporate IT and process control/SCADA network. A DMZ was integrated by using an Industrial Defender Guard...

  • UTM FOR THE ENTERPRISE. Snyder, Joel // Information Security;Apr2012, Vol. 14 Issue 3, p19 

    The article discusses a network security device known as Unified Threat Management (UTM), which comprises of multiple security features on a firewall in the form of appliance. Initially, it was designed for small and medium sized business (SMB) networks. It also discusses main requirements for...

  • S ilentK nock: practical, provably undetectable authentication. Vasserman, Eugene; Hopper, Nicholas; Tyra, James // International Journal of Information Security;Apr2009, Vol. 8 Issue 2, p121 

    Port knocking is a technique to prevent attackers from discovering and exploiting vulnerable network services, while allowing access for authenticated users. Unfortunately, most work in this area suffers from a lack of a clear threat model or motivation. To remedy this, we introduce a formal...

  • Network Security Appliance Fortifies Defense for Hacker Attacks.  // IT Professional;Jul/Aug2000, Vol. 2 Issue 4, p68 

    Features the RapidStream 6000 network security appliance developed by RapidStream Inc. which offers full duplex 200 Mbps of firewall throughput and virtual private networking throughput. Applications for computer protection and security from hacker attacks; Access to electronic commerce servers...

  • Three crucial elements for maximum security.  // Communications News;Dec2001, Vol. 38 Issue 12, p38 

    Cites the emergence of integrated virtual private network (VPN)/firewall solutions. Functions of VPN and firewalls; How both solutions optimize computer network security; Disadvantage of using stand-alone VPN.

  • Maverick Irvine Valley Professor Wins First-Amendment Case. Freedman, Eric // Community College Week;9/17/2001, Vol. 14 Issue 3, p11 

    Focuses on the victory of Roy Bauer, a professor of ethics and political philosophy at South Orange County Community College District in Irvine, California, in a legal battle over the First Amendment rights. Brief information on the articles of Bauer published in the `Dissent' periodical;...

  • NAC Services. ROITER, NEIL // Information Security;Oct2008, Vol. 11 Issue 8, p52 

    The article offers information on the network access control (NAC) services to be provided by Verizon Business. NAC adoption grew 16 percent over the first quarter of 2007, according to an Infonetics report. Omar Khawaja, manager of security solutions marketing, explains that NAC is more about...

  • Triple-A.  // Network Dictionary;2007, p497 

    A definition of the term "triple-A" is presented. More commonly known as AAA or authentication, authorization and accounting, it refers to a security framework for controlling access to network resources.

  • Economic downturn a catalyst for telecommuting -- and security breaches.  // NetworkWorld Asia;Jun/Jul2009, Vol. 5 Issue 3, p26 

    The article focuses on the benefits and threats of telecommuting on organizations in Asia. It cites that telecommuting has been helpful in increasing employee productivity, profitability and effectiveness. However, it emphasizes the need for businesses to consider the threat of telecommuting on...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics