Unformatted text preview: • Look for Unwelcome Hosts • Restrict the Bandwidth Used by Violating Hosts • Limit the Rate of New Traffic Flows to or from One Host Case Study 10-4 Since the company is small, cost may be a significant factor. However, since they are working on a groundbreaking project, it is possible that many people would be interested in stealing it, so the more difficult their security is to breach, the better. And since the company is made up of people who are comfortable with technology, a very restrictive security system would not be too difficult for them to learn and bear with. Physical security could probably be kept fairly minimal. Since all the employees will know each other, a security guard probably isn't necessary, although keeping the servers behind lock and key will be a must. Rotating passwords and/or a token/PIN system, encrypted hard drives on all workstations, and maybe even some biometrics could be useful....
View Full Document
This note was uploaded on 07/24/2009 for the course BIS 220 taught by Professor Gold during the Summer '08 term at DeVry Cincinnati.
- Summer '08