Advances in Enterprise Information Technology Security by Djamel Khadraoui, Francine Herrmann

By Djamel Khadraoui, Francine Herrmann

Advances in company info know-how defense presents a wide operating wisdom of the entire significant defense matters affecting todays firm IT actions. The chapters during this prime Reference resource are written through many of the worlds best researchers and practitioners within the filed of IT protection. There are not any uncomplicated and whole solutions to the problems of protection; for that reason, a number of thoughts, thoughts, and functions are completely tested. This reference paintings offers the instruments to deal with possibilities within the box, and is an all-in-one reference for IT managers, community directors, researchers, and scholars.

Show description

Read Online or Download Advances in Enterprise Information Technology Security (Premier Reference) PDF

Best comptia books

The Corporate Security Professional's Handbook on Terrorism

The company safety Professional's guide on Terrorism is a certified reference that clarifies the variation among terrorism opposed to firms and their resources, as opposed to terrorism opposed to executive resources. It addresses the present misconceptions concerning how terrorism does or doesn't impact businesses, and offers protection pros and company executives with a greater figuring out of ways terrorism may well influence them.

Security and Embedded Systems: Volume 2 NATO Security through Science Series: Information and Communication Security (Nato Security Through Science)

Technological advances have ended in broad deployment and use of embedded platforms in an expanding variety of purposes, from cellphones to automobile, aircraft and spacecraft and from electronic ids to army structures within the box. lots of those purposes position major protection specifications and feature ended in major examine task within the sector of defense and embedded platforms, because of the restricted assets of traditional embedded syst+S37ems.

Advances in Enterprise Information Technology Security (Premier Reference)

Advances in company info expertise safety offers a large operating wisdom of all of the significant defense matters affecting todays company IT actions. The chapters during this prime Reference resource are written through a few of the worlds major researchers and practitioners within the filed of IT safety.

Additional info for Advances in Enterprise Information Technology Security (Premier Reference)

Sample text

Company “B” architecture with medium protection 14 Security Architectures For its protection, the firewall should be configured so that communications to the authentication server are restricted to only the machines needing to authenticate users: the headquarters’ border router (for remote users’ authentication), the intranet Web (employees’ authentication), the extranet Web (client’s authentication) and the e-mail server (employees’ authentication). The extranet Web is moved to the firewall’s DMZ to offer extranet partners a higher protection level.

2002). The practice of network security: Deployment strategies for production environments. Prentice Hall. , & Crothers, T. (2002). Firewall architecture for the enterprise. Wiley. , & Stout, B. (2006, February). Return on security investment (ROSI)–A practical quantitative model. Journal of Research and Practice in Information Technology, 38(1), 99. 19 20 Chapter II Security in GRID Computing Eric Garcia University of Franche-Comté, France Hervé Guyennet University of Franche-Comté, France Fabien Hantz University of Franche-Comté, France Jean-Christophe Lapayre University of Franche-Comté, France Abstract GRID computing implies sharing heterogeneous resources, located in different places belonging to different administrative domains over a heterogeneous network.

Figure 3. Company “A” architecture with medium protection 13 Security Architectures The e-mail service is well protected from Internet thanks to the router and firewall which are configured so that SMTP packets coming from Internet and addressed to the e-mail proxy are permitted. Remote users’ access and branch offices’ access are achieved in the same way than in the first kind of architecture (see section “Company A Case Study for Minimal Protection”). Finally, for users of remote branches to get their e-mails through the VPN, one rule should be configured in the firewall to permit machines from branch offices to send POP or IMAP packets to the e-mail server.

Download PDF sample

Rated 4.93 of 5 – based on 35 votes