<$BlogRSDUrl$>
 

This page is powered by Blogger. Isn't yours?

 Feedblitz email:
 RSS: http://linkingintegrity.blogspot.com/atom.xml

 

linking INTEGRITY

Integrity - use of values or principles to guide action in the situation at hand.

Below are links and discussion related to the values of freedom, hope, trust, privacy, responsibility, safety, and well-being, within business and government situations arising in the areas of security, privacy, technology, corporate governance, sustainability, and CSR.

Six steps to strong network security, 1.9.04

NetworkWorldFusion

Six steps to strong network security

As more attacks penetrate perimeter defenses, these six steps can help ensure your organization's network and applications remain secure.

  1. Recognize the limits of the perimeter. Although perimeter security technologies such as firewalls and intrusion-detection systems (IDS) are important, they are just one part of an overall security solution. As more organizations look to open up their networks to business partners and customers, the perimeter becomes more porous and application-level security needs to play a greater role.
  2. Build internal moats. Smart organizations identify their most critical and vulnerable resources and then deploy perimeter-like security devices, such as firewalls and IDSs, around them. This provides an added layer of defense and ensures that in the event of a perimeter breach, critical assets still are protected.
  3. Protect against attacks from within. Realize that your internal network is no longer a trusted zone and act accordingly. Technologies such as Zone Alarm's Integrity, which checks PCs to ensure they have the proper virus signatures and patch levels in place before providing access to the network, help ensure internal vulnerabilities are mitigated.
  4. Deploy application-specific security wares. Firewall vendors, including Check Point, F5 and Top Layer are rolling out intrusion-prevention systems that sit between perimeter defenses and internal servers. These devices perform application-specific deep packet inspection on traffic that the perimeter firewall lets through. They are especially effective at stopping application-specific attacks such as domain-level attacks that focus on DNS vulnerabilities or Web attacks that exploit known HTTP and FTP holes.
  5. Improve identity management. If you can't get to a service, you can't compromise it. New technologies, such as TNT's Identity, look to ease internal and external identity management by integrating with directory services, such as Microsoft's Active Directory, and checking identity at the packet level. Ensuring that only authorized users and applications are granted access goes a long way toward shoring up application security.
  6. Integrate security into application development. If applications have no security holes, they can't be breached, no matter how insidious the attack. Vulnerability scanners from Spiware and Sanctum can help ensure that applications are hole-free before deployment. Also examine shrink-wrapped products for proper coding practices.

[This was included in a very good article with examples.]


Comments

Post a Comment

 

Google

Integrity Incorporated

Site Feed

 Feedblitz email:


 RSS: http://linkingintegrity.blogspot.com/atom.xml


"We shall need compromises in the days ahead, to be sure. But these will be, or should be, compromises of issues, not principles. We can compromise our political positions, but not ourselves. We can resolve the clash of interests without conceding our ideals. And even the necessity for the right kind of compromise does not eliminate the need for those idealists and reformers who keep our compromises moving ahead, who prevent all political situations from meeting the description supplied by Shaw: "smirched with compromise, rotted with opportunism, mildewed by expedience, stretched out of shape with wirepulling and putrefied with permeation.
Compromise need not mean cowardice. .."

John Fitzgerald Kennedy, "Profiles in Courage"

Archives

07.03   08.03   09.03   10.03   11.03   12.03   01.04   02.04   03.04   04.04   05.04   06.04   07.04   08.04   09.04   10.04   11.04   12.04   01.05   02.05   03.05   04.05   05.05   06.05   07.05   08.05   09.05   10.05   11.05   12.05   01.06   02.06   03.06   04.06   05.06   06.06   08.06   09.06   10.06   11.06   01.07   02.07   03.07   04.07   07.07   08.07   09.07   10.07   05.08   06.08