Seguridad Informatica

Páginas: 24 (5957 palabras) Publicado: 25 de febrero de 2013
p p p p p p ppppppppp p p p p p p p p p ppppppppp p p p p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p ppppppppp p p pp p p p p p ppppppppp p p p p p p p p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p ppppppppp p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p ppppppppp p p p p p p p p p p p p p p ppppppppp p p p pp p p p ppppppppp p p p p p p p p p ppppppppp p p p p p p p ppppppppp p p p p p p p p p p p ppppppppp p p p p p p p p p ppppppppp p p p p p p pppp

TechGuide
Network Security
Time to Move Beyond Signatures Skilled Network Experts Fend off Zombies Is New Technology Bypassing Traditional Controls? India Inc. Goes Beyond Routine

A global look at network security technologies

q THREATDETECTION: q bOTNETs:

q DEVICE sECURITY:

q sECURITY AssEssMENT:

pppppppppppp pppppppppppp pppppppppppp pppppppppppp pppppppppppp pppppppppppp THREAT pppppppppppp pppppppppppp DETECTION pppppppppppp pppppppppppp pppppppppppp pppppppppppp pppppppppppp pppppppppppp

Time to Move Beyond Signatures
Network threat detection requires a new paradigm where content is monitored and analyzed, ratherthan solely relying on matching network packets to existing signatures.
by michael s. mimoso
THREAT DETECTION

BOTNETS

finding malware, or
DEVICE SECURITY

worse, attackers pivoting from server to server on your

network, is a difficult proposition. Persistent, motivated hackers are adept at developing code that evades detection from signature-based network security devices. And moreoften than not, attackers are penetrating enterprise networks using legitimate credentials stolen via social engineering scams. the cat-and-mouse game between security analysts and attackers has become a highstakes game too, with more than stolen payment information at stake. More and more, corporate and political espionage is motivating hackers to poke and prod network threat detection, lookingfor anything from intellectual property to military secrets. surely, long gone are the days when security managers can hide behind their firewalls and feel protected. “the guys who are more aware of the game these days know firewalls and iDs are not enough; sure, some are still in that compliance mindset, but that’s got to change and it’s going to change,” said Marty roesch, developer of the snortintrusion detection system, and cto and founder of columbia, Md.based sourcefire inc. “those who don’t change? Attackers will change the game for them.” Packet filtering firewalls are no longer enough to safeguard networks from

SECURITY ASSESSMENT

Attackers are penetrating enterprise networks using legitimate credentials stolen via social engineering scams.

2

network security pppppppppppp pppppppppppp pppppppppppp pppppppppppp pppppppppppp pppppppppppp THREAT pppppppppppp pppppppppppp DETECTION pppppppppppp pppppppppppp pppppppppppp pppppppppppp pppppppppppp pppppppppppp

attackers. experts recommend a gamut of new security means to keep data safe, ranging from sandboxing capabilities, smarter re-architecting of networks and configurations, content analysis, visibility andcontext into what’s happening on a network, and intelligence about the latest threats and hacker techniques. in other words, this ain’t your father’s network security any more.
THREAT DETECTION

“i think the packet-centric approach has been, if it’s not dead, eclipsed by much more focus on the content. All of the exciting developments have been less about making good matches against packets...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • SEGURIDAD INFORMATICA
  • Seguridad Informatica
  • Seguridad Informatica
  • Seguridad Informatica
  • Seguridad informatica
  • Seguridad Informática
  • Seguridad informatica
  • Seguridad informatica

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS