2.4 Technological Countermeasures


2.4 Technological Countermeasures

Of course, what most people (other than physical security experts!) are concerned with is the use of technological countermeasures. While they play only a small part in the overall security scheme of a network, they are usually the most foreign and intimidating to the general public. There is the assumption that some sort of magic must be occurring in them that makes them the accessible only to the high wizards of networking. Not so! The most common technological controls relate to controlling access to the system, creating a secure network architecture, controlling network access, the use of encryption, and the auditing of all of the above countermeasures. Each of these is covered in a separate chapter in this book.




Network Perimeter Security. Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
ISBN: 0849316286
EAN: 2147483647
Year: 2004
Pages: 119
Authors: Cliff Riggs

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net