Access "The Fulda Gap and defense in depth strategy"
This article is part of the July 2004 issue of Olympic trials: Securing the summer games
East of Frankfurt, Germany, lays the Fulda Gap, once the focal point of the largest peacetime concentration of military forces in history. During the Cold War, more than a million NATO and Warsaw Pact troops faced off, waiting for ?the balloon to go up" (as they'd say in the military), signaling the start of World War III. The Fulda Gap was the most likely avenue of approach by Warsaw Pact forces in their march toward the Atlantic. World War III, as it was envisioned during the Cold War, would be a test of Western technology versus the Soviet Union's numerical superiority. While technology would eventually win the war (we hoped), NATO planners concluded that nothing could blunt the initial Russian thrust. Thus, the Fulda scenario called for a fighting retreat to positions near the Rhine River. NATO would then use its superior knowledge of the terrain, its advanced weaponry and superior tactics to slow and thwart the Russian invaders. Enterprise networks are a lot like the Fulda scenario, in which enterprise security managers must use their superior ... Access >>>
Premium Content for Free.
IT network security: Securing the summer Olympics
by Dennis McCafferty, Contributing Writer
While physical security at the Olympics is paramount, information security for its vast IT network is also a major challenge.
Acceptable use policies will minimize email risks
by George Wrenn, CISSP
Learn why setting comprehensive email acceptable use policies can help minimize email risks and secure your email applications.
How to prevent phishing scams and protect customers
by Nalneesh Gaur
In this tip, Web security guru, Nalneesh Gaur examines how hackers are using phishing scams to exploit financial sectors of the industry, why you should care and what you can do to prevent these attacks.
- IT network security: Securing the summer Olympics by Dennis McCafferty, Contributing Writer
USB security tokens may not be as secure as you think
by Tom Bowers, Contributor
USB tokens aren't as strong as you think. Multifactor authentication is meaningless when the supporting software is insecure.
Will intrusion prevention systems live up the hype?
Will intrusion prevention ever live up to its promise?
- USB security tokens may not be as secure as you think by Tom Bowers, Contributor
The Fulda Gap and defense in depth strategy
Enterprise security managers need to think like warriors when it comes to protecting their systems. Lawrence Walsh explains why.
- The Fulda Gap and defense in depth strategy
More Premium Content Accessible For Free
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...