How to Combat Network Attacks
Results 1 to 3 of 3

Thread: How to Combat Network Attacks

Hybrid View

  1. #1

    How to Combat Network Attacks

    The network attacks try to collect data and to check the vulnerabilities that can be later exploited to compromise the network in order to gain entry to the email accounts, databases, information systems or corporate networks. In practice, an effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them.

    The recommended network security tools to be used are mainly:

    1. Antivirus software applications which are a set of packages that can counter most virus threats if they are regularly updated and correctly maintained,
    2. Secure network infrastructure devices such as routers and switches. These devices have hardware and software functions that enable secure connectivity, perimeter security, intrusion protection, identity services, and security management,
    3. Dedicated network security hardware and software tools such as firewalls and intrusion detection systems providing protection for all areas of the network and enabling secure connectivity between the network nodes,
    4. Virtual private networks provide access control and data encryption between two different computers on a network. This technology allows remote workers to connect to the network without the risk of ahacker or thief intercepting data,
    5. Identity service helps to identify users and control their activities and their transactions on the network. It consists of authenticating the users, with a username and a password, electronic identity or biometric access. Generally, the type of access depends on how critical the network services are and the combination of multiple types of access equates to what is called a two-factor authentication or multiple factor authentication. This combined mode provides a stronger authentication scheme since the user has to know, for example, the username/password and has match at the same time the biometric profile.
    6. Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized communicating parties.

  2. #2
    THE Bastard Sys***** dinowuff's Avatar
    Join Date
    Jun 2003
    Location
    Third planet from the Sun
    Posts
    1,247
    WTF???

    What dumb-ass third grade text book was this copied from?
    09:F9:11:02:9D:74:E3:5B8:41:56:C5:63:56:88:C0

  3. #3
    Keeping The Balance CybertecOne's Avatar
    Join Date
    Aug 2004
    Location
    Australia
    Posts
    659
    I second dinowuff. Motion carried?
    "Any intelligent fool can make things bigger and more complex... It takes a touch of genius --- and a lot of courage to move in the opposite direction."
    - Albert Einstein

Similar Threads

  1. Replies: 1
    Last Post: March 8th, 2004, 05:46 PM
  2. Simulate DDos attacks on network
    By proactive in forum Security Archives
    Replies: 3
    Last Post: January 10th, 2002, 11:45 PM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides