Access "Military information technology: Computer network defense in Iraq"
This article is part of the March 2004 issue of Screen test: App-layer controls beef up perimeter firewalls
Arabian sands had no safe haven for U.S. troops during Operation Iraqi Freedom. Dotting the barren Kuwaiti and Iraqi frontier, soldiers and airmen routinely found themselves targets of enemy rocket attacks and frontline probing actions. Seasoned combat troops might expect such dangers, but not reservists in the 335th Theater Signal Command, who built, secured and maintained the American and coalition forces' IT networks. Firewalls and IDSes kept enemy hackers off their systems, but they relied on nearby Patriot batteries to keep Saddam Hussein's Ababil-100 missiles at bay. It has been a year since U.S. troops pushed across the Kuwaiti border in their drive toward Baghdad. In the weeks leading up to the war and those tumultuous two months of heavy fighting, the network and security specialists supporting the combat divisions found that there are worse things than a bad day at the office. "Everything is relative," says Tom Lantzy, a major in the U.S. Army Reserve who recently returned to his job as an infrastructure project manager for CocaCola. "If you've ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
2004: Evaluating top firewalls for application-layer attack defense
by Joel Snyder
We evaluated six leading top firewalls to see how well they defend against application-layer attacks.
-
2004 Desktop antivirus product reviews: Evaluating 10 antivirus products
by Ed Skoudis, CISSP
Ed Skoudis outlines the specifications of the desktop antivirus product reviews he conducted for Information Security magazine.
-
Ensure secure routing protocols with access control best practices
by Merike Kaeo, Contributing Writer
Enterprises have hardened their perimeters with VPNs, firewalls and intrusion detection systems, but organizations need to focus more on securing routing protocols.
-
Military information technology: Computer network defense in Iraq
by Erik Sherman
Learn how US military networks maintain their IT security and computer network defense in the midst of a war.
-
Risk assessment methodology: Anatomy of the risk assessment process
by Charles Cresson Wood
A risk assessment will provide focused information about threats, how well you're protected against those threats and what's missing from your security program.
-
2004: Evaluating top firewalls for application-layer attack defense
by Joel Snyder
-
-
Firewall comparison: Packet-filtering firewalls versus proxy firewalls
by Joel Snyder, Contributing Writer
Stateful packet-filtering firewalls account for more than 90% of the market, but the proxy firewall folks haven't rolled up their tents yet. In this firewall comparision you will discover which is better for your enterprise?
-
Making an example: Enforcing company information security policies
by Lawrence M. Walsh
Nothing motivates policy compliance like the threat of a pink slip. Learn how you can enforce company information security policies.
-
Router security setup: How to secure your router
by Merike Kaeo
The most basic steps on how to secure your router.
-
How to sell risk assessment benefits to IT execs
by Charles Cresson Wood
Need to justify the expense and effort of a risk assessment? Security policy guru Charles Cresson Wood spells out 10 risk assessment benefits to convince your boss.
-
Firewall comparison: Packet-filtering firewalls versus proxy firewalls
by Joel Snyder, Contributing Writer
-
Columns
-
Pirated software security: Patching pirated software
by Lawrence M. Walsh
Patching pirated software is similar to needle exchange programs, through which we stem the spread of communicable diseases by giving intravenous drug users safer instruments for their addiction.
-
Oracle's Mary Ann Davidson: Secure coding? Absolutely!
by Mary Ann Davidson, CSO, Oracle
Mary Ann Davidson, CSO of Oracle, responds to Andy Briney's commentary on secure coding.
-
Implementing a better operational risk management framework
by Jay Heiser, Contributor
Hackers don't impact long-term stock prices; rogue traders and lousy products do.
-
The security improvements of Microsoft ISA Server 2004
by Victor R. Garza
In an effort to bolster its security image, Microsoft is going to release its ISA Server 2004 later this year. Here you will learn about the security improvements of Microsoft ISA Server 2004.
-
Security and IT business intelligence
by Andrew Briney
Your CIO uses security and IT business intelligence to make decisions. Shouldn't you?
-
Pirated software security: Patching pirated software
by Lawrence M. Walsh
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO