DocumentCode :
1866437
Title :
How to Stay Secure in a Network Without Perimeters
Author :
King, P.
fYear :
2006
fDate :
13-14 June 2006
Firstpage :
199
Lastpage :
215
Abstract :
Network security starts at the top level. Threats can be thought of in 3 categories: disruption, loss and reputational damage. Always understand the risks that these threats brings. As of protection to these threats, protect the end points and don´t just rely on signature based detection alone. Also, security monitoring needs to be automated. Detection systems must include anomaly based systems. Finally, educate and the train the network users.
Keywords :
computer networks; digital signatures; training; anomaly based systems; network security; security monitoring; signature based detection;
fLanguage :
English
Publisher :
iet
Conference_Titel :
Crime and Security, 2006. The Institution of Engineering and Technology Conference on
Conference_Location :
London
Print_ISBN :
0-86341-647-0
Type :
conf
Filename :
4123760
Link To Document :
بازگشت