Corporate Network Security advertisement

2008 ◽  
Vol 10 (4) ◽  
pp. c4-c4
2020 ◽  
Vol 10 (21) ◽  
pp. 7926
Author(s):  
Michał Walkowski ◽  
Maciej Krakowiak ◽  
Jacek Oko ◽  
Sławomir Sujecki

The time gap between public announcement of a vulnerability—its detection and reporting to stakeholders—is an important factor for cybersecurity of corporate networks. A large delay preceding an elimination of a critical vulnerability presents a significant risk to the network security and increases the probability of a sustained damage. Thus, accelerating the process of vulnerability identification and prioritization helps to red the probability of a successful cyberattack. This work introduces a flexible system that collects information about all known vulnerabilities present in the system, gathers data from organizational inventory database, and finally integrates and processes all collected information. Thanks to application of parallel processing and non relational databases, the results of this process are available subject to a negligible delay. The subsequent vulnerability prioritization is performed automatically on the basis of the calculated CVSS 2.0 and 3.1 scores for all scanned assets. The environmental CVSS vector component is evaluated accurately thanks to the fact that the environmental data is imported directly from the organizational inventory database.


Author(s):  
Andy Luse

This chapter describes various firewall conventions, and how these technologies operate when deployed on a corporate network. Terms associated with firewalls, as well as related concepts, are also discussed. Highly neglected internal security mechanisms utilizing firewall technologies are presented, including host-based firewalls and the more novel distributed firewall implementation. Finally, a section on how to perform a cost-benefit analysis when deciding which firewall technologies to implement is included. The chapter is designed as an introductory tutorial to the underlying concepts of firewall technologies. This understanding should provide a starting point for both systems support specialists implementing network security and researchers who are interested in firewall technologies.


2011 ◽  
Vol 3 (2) ◽  
pp. 104-132 ◽  
Author(s):  
Andy Luse ◽  
◽  
Brian Mennecke ◽  
Janea Triplett ◽  
Nate Karstens ◽  
...  

2011 ◽  
Vol 3 (1) ◽  
pp. 52-54 ◽  
Author(s):  
N. Amsaveni N. Amsaveni ◽  
◽  
R. Vasanthi R. Vasanthi

2010 ◽  
Vol 69 (7) ◽  
pp. 629-638
Author(s):  
J. Sisniega-Gonzalez ◽  
E. Aguirre-Anaya ◽  
Mariko Nakano-Miyatake ◽  
Hector Manuel Perez-Meana

Sign in / Sign up

Export Citation Format

Share Document