According to a recent survey conducted by NSC technology fewer than 10 percent of break-ins to IT systems come from external hackers. This statistic though alarming mentions break-ins. The threats ...Written by: Dennis Spalding and added on April 5, 2011
A global explosion of Internet has taken place over the past several years, with this rapid increase of system deployment the information security community has witnessed a dramatic increase in ...Written by: James Corrie and added on April 9, 2011
If you're anything like me, you've always heard about how important security is and how a secure infrastructure is so crucial. You've probably also been rather overwhelmed with all the ...Written by: Lyde Andrews and added on May 17, 2011
This document discusses fundamental security concepts and architectures applicable to TCP/IP networks. This document is a primer and is meant to convey a broad abstract of security in a networking ...Written by: Craig E. Lindner and added on June 2, 2011
Network security is not a product that you can purchase it's a process, a long process that you continually update, improve, and monitor. A process that has a policy to ...Written by: Paul A. Zocco and added on May 14, 2011
Information Security is the never-ending process of trying to assure the confidentiality, integrity, and availability of your stuff. I am new to this industry and I consider it a daunting ...Written by: Jim Sherrill and added on March 30, 2011
It is a well-known fact that in the Internet-connected world network perimeter vulnerabilities do exist that allow unauthorized individuals access to networks and provide the ability to disrupt business continuance. ...Written by: Michael Bruck and added on June 22, 2011
1. What is computer security?
Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users ...
What is a firewall?
A firewall is a gateway that restricts and controls the flow of traffic between networks, typically between an internal corporate network and the Internet. Firewalls ...
As IT Security professionals struggle to respond to the increasing threats posed against their networks, too often, the approach taken consists of various silo projects aimed at eliminating one ...