Pages

Tuesday, September 21, 2010

Intrusion Detection System

Intrusion Detection System

INTRODUCTION:

Security Concerns:


Despite nearly universal efforts to protect corporate networks, today’s distributed organizations are still susceptible to a multitude of attacks. IT executives are challenged to extend security beyond the corporate backbone to protect a variety of potential vulnerabilities, including Internet connections, communication channels between remote and corporate offices and links between trusted business partners. Unfortunately, the preventive measures employed to secure corporate resources and internal traffic don’t provide the breadth or depth of analysis needed to identify attempted attacks or uncover potential threats across the organization.

Network Security Management:

Security is the process of staying informed. The goals of security include Confidentiality (ensuring only authorized users can read or copy a given file or object), Control (only authorized users can decide when to allow access to information), Integrity (only authorized users can alter or delete a given file or object), Authenticity (correctness of attribution or description), Availability (no unauthorized user can deny authorized users timely access to files or other system resources), and Utility (fitness for a specified purpose).


for more info visit.
http://www.enjineer.com

No comments:

Post a Comment