Proactive Network Security: Making Your Network Unassailable
نویسنده
چکیده
he “market” for digital attacks is growing rapidly as the number of networked devices and software vulnerabilities continues to increase. Organizations are already so deluged with attacks that the current strategy of responding to intrusions no longer works because the alarms are turning into a new source of organizational white noise. Proactive network security offers a new strategy by combining five key elements: (1) detailed assessment of all the devices on the network; (2) continuous monitoring of those devices; (3) maintenance of a databa se o f known vu lne r ab i l i t i e s ; (4) evaluation and prioritization of threats based on the business value of each of the networked devices; and (5) management of corrective actions through ownership and workflow. Used in combination with reactive technology such as intrusion detection systems, proactive network security offers realistic protection by treating threats and vulnerabilities not as isolated events, but as permanent “features” of the new networked environment. INTRODUCTION Security has, of course, become one of the highest priorities of every company. Despite all the hype, the extent of the problem is not always understood. For example, a typical global 2000 enterprise security system generates over two million alerts every day. In 2002, digital attacks resulted in $42 billion worth of damage. And, according to the CERT Coordination Center (CERT/CC) at Carnegie Mellon University, the number of attacks is doubling every year. Even if you do not believe the numbers, the reality is that you or someone you know has been affected by an information security incident within the past 24 hours. Security is no longer a matter of guarding against occasional attacks. Organizations are under perpetual and continual attack. Digital attacks are now more frequent than spam. And, just as it is no longer possible to deal with spam by opening each message for visual inspection, digital attacks must be dealt with proactively. The constant flood of attacks is a new fact of life for organizations, and requires a new approach to security. T M U N I C A T I O N S , N E T W O R K , A N D I N T E R N E T S E C U R I T Y
منابع مشابه
Secure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملProactive Vulnerability Assessments with Nessus
Proactive Vulnerability Assessments with Nessus The goal of this paper is to illustrate the benefits of deploying Nessus as a low-cost vulnerability scanner as a supplement to an existing security model. I'll discuss vulnerability scanning in general, what Nessus is all about, how to begin scanning your network, and finally why a vulnerability scanner is an essential component of an effective s...
متن کاملDynamic Risk Measurement and Mitigation for Proactive Security Configuration Management
The factors on which security depends are of dynamic nature. These include emergence of new vulnerabilities and threats, policy structure and network traffic. Due to the dynamic nature of these factors, objectively identifying and measuring security metrics is a major challenge. However, such an evaluation can significantly help security professionals in decision making such as choosing between...
متن کاملA Study on Network Intrusion Detection Based on Proactive Mechanism
In the current internet world where peoples are connected through communication channel and most of their data is hosted on the internet connected resources. Therefore the security is the major concern of this internet community to protect the resources and to protect the data hosted on these networks. In current trends, most of the end user are relying on the end security products such as Anti...
متن کاملProCurve ProActive Defense: A Comprehensive Network Security Strategy
ProCurve ProActive Defense .....................................................................................5 Simultaneous Offense and Defense .........................................................................6 Offense ..........................................................................................................6 Defense ......................................................
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information Systems Security
دوره 14 شماره
صفحات -
تاریخ انتشار 2005