Network Security Policy Design And Implementation

Read Complete Research Material


Network Security Policy Design and Implementation

Network Security Policy Design and Implementation


Let us go back, twelve years. Where's Internet? Concentrated in the cables that connect the offices and cubicles of the American ministry of defense. Things were simple, and despite the sensitive nature of the data transferred no body talked about net work security, no body knew what was to follow. Some how a revolution was triggered, the information net burst out of its official mould, a chain reaction started and took the whole world over.


When there are crimes there has got to be inspectors, protectors and defenders. Perhaps no body can really tell when the first cyber theft took place, but every body knows that these thefts their nature and defense against them drives multimillion dollar industries. As so much of business is going online with their employees connected through Intranets and LAN networks information floats in air. Some of this information is very sensitive and its breach or secure delivery may at times stand apart with billions of dollars in between

So where are the guards and the protectors, here they are, and they are called Network security. As hacking has progressed and has been glamorized, so has Network security developed. First we must define what we are talking about. A lot of companies are now a days connected through internal information webs that are called Networks

But Network crime is not just theft or credit card hacking. Their are a number of motives ranging from, greed to professional jealousy. A lot of times the competition wants to know your trade secrets to put you out of business. Thomas Noonan, the president and CEO of Internet Security Systems (ISS) in Atlanta, Ga. Describes three fallacious myths that help to employ unsecured Network security protocols. First myth ...
Related Ads