beyondfirewall - Introduction The Internet has become a key...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
The Internet has become a key tool for business communication and information sharing, and many organizations would cease to function if e-mail and Web access w ere denied for any significant period. All Internet Content you read, send, and receive carries a risk. The number of potential security risks has increased at the same time that dependence on information technology has grown, making the need for a comprehensive security program even more important. Likewise, the job of those persons tasked with network security, often system administrators, has never been harder. The number of reported security incidents continues to grow and there is little indication that this trend will reverse at any time in the near future. In 2001, there were 52,658 reported incidents. By the end of the first quarter of 2002 there were already 26,829 incidents reported. A reported incident can be as simple as a single computer being compromised or as severe as a complete network compromise involving hundreds of client computers. The number of reported security vulnerabilities has continued to grow at the same alarming rate with 2,437 vulnerabilities reported in 2001 and 1,065 reported by the end of Q1 2002 1 . Unfortunately, many companies have stopped short of implementing a more secure “layered” approach to network security and have chosen to rely solely on the firewall/virus scanner approach. While firewalls and virus protection are necessary, by themselves they address only one portion of potential security risks and may contribute to a false sense of security. A more complete approach integrates these technologies with other effective tools including Web and e-mail filtering, intrusion detection, PKI, and artificial intelligence tools. Advanced tools can automate many tasks and increase the efficiency of a security program while reducing demand on network administrators. Introduction Major Threats to Networks Experts discover new security vulnerabilities almost every day. These newly discovered vulnerabilities may be due to flaws in software or they may be the result of software configuration errors. Hackers or other malicious individuals can exploit these vulnerabilities to gain access to network assets. Administrators must spend a lot of time and energy just staying informed about and dealing with new vulnerabilities. Often the result is that they are unable to take the time to monitor and educate staff. Enforcement of security policies may be non-existent or rely on the honor system. Failure to defend against the key threats to data and network assets can result in disaster.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
±² Employee Behavior Companies can face significant risk due to the behavior of their employees. Whether malicious or accidental, security incidents due to insiders are becoming more frequent. Insiders may present a more likely threat to many organizations than an attack by hackers or other malicious outsiders. E
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/01/2012 for the course LAN 340 taught by Professor Bryanjensen during the Spring '12 term at American Public University.

Page1 / 11

beyondfirewall - Introduction The Internet has become a key...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online