This preview shows page 1. Sign up to view the full content.
Unformatted text preview: Look for Unwelcome Hosts Restrict the Bandwidth Used by Violating Hosts Limit the Rate of New Traffic Flows to or from One Host Case Study 10-4 Since the company is small, cost may be a significant factor. However, since they are working on a groundbreaking project, it is possible that many people would be interested in stealing it, so the more difficult their security is to breach, the better. And since the company is made up of people who are comfortable with technology, a very restrictive security system would not be too difficult for them to learn and bear with. Physical security could probably be kept fairly minimal. Since all the employees will know each other, a security guard probably isn't necessary, although keeping the servers behind lock and key will be a must. Rotating passwords and/or a token/PIN system, encrypted hard drives on all workstations, and maybe even some biometrics could be useful....
View Full Document
- Summer '08