Layered access control: Six top defenses that work
Six top strategies and best practices for building layered security in networks.
This presentation by Dr. Joel M. Snyder, Senior Partner at Opus One and Technical Editor for Information Security...
Continue Reading This Article
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
magazine, was given at Information Security Decisions Spring 2005.
From the Internet down to PDAs -- every device that touches or connects to a network is a potential security problem. Successful network security requires attention to detail at every layer, starting from the outside and moving in. In this talk, Dr. Joel M. Snyder, Senior Partner at Opus One and Technical Editor for Information Security magazine, introduces six strategies for building layered security in networks. By moving from a statement of requirements and problems needing to be solved, into definite actions you can take today, these strategies define clear prescriptions to bolster network security.
Snyder not only covers the six top strategies, he also highlights best practices for putting it all together in an enterprise network in the areas of:
- Authentication and authorization
- Traffic separation and coarse-grained security
- Fine-grained security and protocol control
- Encryption and privacy
- Intrusion detection and problem remediation
- Endpoint security awareness and enforcement
View the presentation
Visit our network access control resource center
Start the conversation
0 comments