Layered access control: Six top defenses that work

Six top strategies and best practices for building layered security in networks.

This presentation by Dr. Joel M. Snyder, Senior Partner at Opus One and Technical Editor for Information Security magazine, was given at Information Security Decisions Spring 2005.


From the Internet down to PDAs -- every device that touches or connects to a network is a potential security problem. Successful network security requires attention to detail at every layer, starting from the outside and moving in. In this talk, Dr. Joel M. Snyder, Senior Partner at Opus One and Technical Editor for Information Security magazine, introduces six strategies for building layered security in networks. By moving from a statement of requirements and problems needing to be solved, into definite actions you can take today, these strategies define clear prescriptions to bolster network security.

Snyder not only covers the six top strategies, he also highlights best practices for putting it all together in an enterprise network in the areas of:

  • Authentication and authorization
  • Traffic separation and coarse-grained security
  • Fine-grained security and protocol control
  • Encryption and privacy
  • Intrusion detection and problem remediation
  • Endpoint security awareness and enforcement

View the presentation

Visit our network access control resource center


 

This was first published in May 2005

Dig deeper on Network Intrusion Detection (IDS)

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close