Tuesday, September 14, 2010

"Deceiving" or "enlightened approach"

Not long ago, the United States have made a home for 2 more than 1000 computer crime survey of SMEs in the network, 88% of companies surveyed in 2005 had at least one safety incident occurred, but nearly half of the company up to four security breaches have occurred accident! Correspondingly, is a separate survey showed that more than 90% of IT managers think that business has been conducted on the company's effective security protection, and only less than 4% of the people a correct understanding of the enterprise information system is difficult to be 100% perfect security.

In fact, most enterprises, especially SMEs, IT director of information security appears blind optimism is not accidental. They tend to believe that their business structure is as complex as many large enterprises, and has been equipped with the mainstream market, anti-virus software and firewall equipment, so should be able to sit back and relax.

However, these enterprises, especially SMEs located in the business environment and the need to face the main enemy - the hacker, and five years ago have made a big difference ... ...

The lifeblood of exposure

First, from the environmental point of view, the network spread and spread, making it the most important drivers for SME development, Er the competitiveness of SMEs edge, largely embodied in its markets and customers a high degree of rapid response, therefore, more dependent upon information networks.

More and more SMEs into their business systems on the network, the network security threats for the information also will increase:

1. Unlike earlier centralized applications, computer systems are mostly small and medium enterprises is based on client / server model and Internet / Intranet network computing model for distributed applications, in such an environment, the company's database servers, file servers, application servers are connected to the network's "door", as long as there is a "gate" did not fully protect, "hackers" will enter the system through the door, theft or destruction of all resources.

2. Intranet improving, with hierarchical network structure, a leading Internet company's transmission link, due to the growing third-party connections, on-site office of the temporary staff needed to connect to the corporate network, and the company's own employees are increasingly mobile stronger, resulting in threats to the Internet can bypass border controls, and then from within a relatively rapid rate of spread. According to ICSA, currently within the system from the enterprise security threat by up to 60%. Therefore, in addition to the original need to protect the growing number of infrastructure, the companies now need to protect the internal network and systems.

3. As the need to maintain a competitive edge, so each company must be applied more rapidly emerging technologies (eg, WLAN, VoIP, and Web services) and all existing technologies and platforms, the new version. Together with a number of important applications built on the internal network, such as property marketing system, customer management systems, office systems. All enterprises not only to manage and protect more computing infrastructure and applications, but most of them are emerging complex structure and procedures, highly fragmented. Results are due to configuration errors and negligence leading to the increasing vulnerability of code.

4. SMEs are usually high growth companies, with the continuous development and growth of enterprises, number of terminals within the enterprise increasingly expanding and changing, increasing the security management more difficult.

Hackers armed

And the increasingly complex and difficult to manage than the information environment, SMEs face a more direct challenge comes from the hacker. In recent years more and more motivation for committing the crime hackers strongly driven by economic interests, and most of the development of SMEs which customer records, financial data, technical characteristics of high commercial value, but the protective measures are often relatively single, so be the best target for hackers.

The past, people might think that hackers will not be developed for SMEs specific means of attack, because it looks more harm than good, in fact, according to Symantec survey found that the development of new malicious software, making the difficulty of getting lower and lower, increasingly sophisticated hacking toolkit growing and can be downloaded anywhere on the Internet, threatening the production of software and modular construction techniques led to the development threat to the behavior of common variants.

At the same time, these security threats are increasingly shorter generation time. From the discovery of new vulnerabilities to launch attacks against the vulnerability of a particular time between the inevitably shortened. In fact, according to recent statistics, leaving enterprises "patch" of the "window of time" on average only six days. Therefore, even if some businesses related to staff time to time on the vulnerabilities the updates, the network is still difficult to guarantee their safety, but at present most SMEs rely on antivirus software and firewall during the update of time, are facing similar problems.

Finally, the hackers use through the use of a variety of mechanisms, and effective method of load or spread of the hybrid means are more likely to avoid the invasion of defense enterprises, and successfully achieve its purpose. Another reason for the worsening situation led to a hacker attack system and the current main weaknesses in the application layer, not the network layer of vulnerability. In this way, they often focus on network layer attack protection strategy activities slip through the net, unfortunately, as mentioned at the outset, most SMEs are only by virtue of such security measures to protect themselves, and that has been foolproof.

Comprehensive intrusion prevention

Bring these issues to face the confusion and challenges for SMEs, Symantec believes that the key point is that the majority of SMEs by focusing on the border is highly reactive defensive measures, it can not maintain the current trend of ever-changing threats synchronization. The new security threats now emerging, and spread with unprecedented speed, will inevitably lead to the current chaos.

In other words, SMEs should be aware of multi-level security measures onion theory, adopt the intrusion detection, intrusion prevention represented mixed preventive measures possible to ensure network security. This is because normally the firewall access control policy is to implement a system of checks flowing through the network traffic, block non-compliant packets. Traditional firewalls to reject those obvious suspicious network traffic, but still allow certain traffic through, so do anything for many intrusion. An invasion of protection technology through the monitoring network or system resources, look for violations of security policies, action or intrusion signs, activities and attacks on the invasion of intercept network traffic and avoid the resulting loss, this way, the problem packets, and all follow-up from the same data stream of data packets, in the IPS device can be removed.

Symantec network security solutions for SMEs, the integration of and highlights the intrusion detection and intrusion prevention system role, such as the Symantec Network Security 7100 (hereinafter referred to as SNS) line of security appliances, regardless of the environment in which the network topology run, by clicking the mouse in the intrusion detection and intrusion prevention switch between modes, this flexibility in the protection of security, network applications as possible to ensure patency.

姝ゅ锛岃櫧鐒惰禌闂ㄩ搧鍏嬬殑鍏ヤ镜闃叉姢绯荤粺铏界劧鏄熀浜庣綉缁滅殑璁惧锛屼絾瀹冨嵈涓昏鐢ㄤ簬鍦ㄨ绠楀爢鏍堢殑鎵?湁灞傞樆姝㈡敾鍑伙紝鍥犳闃叉姢涓ュ瘑鍏ㄩ潰銆傚叾涓昏鎶?湳鐗规?濡備笅锛?br />
路閲囩敤鍒涙柊鍏ヤ镜闃茶寖缁熶竴缃戠粶寮曟搸 (IMUNE)銆侷MUNE 鏋舵瀯缁撳悎浜嗗绉嶆娴嬫妧鏈紝涓嶄粎鍙互鍑嗙‘鏍囪瘑宸茬煡鍜屾湭鐭ユ敾鍑伙紝鑰屼笖鍙互灏嗗涓嶅瓨鍦ㄥ▉鑳佺殑鍚堟硶閫氫俊鐨勫奖鍝嶉檷鑷虫渶浣庛?IMUNE 绯荤粺杩樺寘鍚鑷畾涔夌壒寰佺殑鏀寔锛涙壂鎻忋?渚﹀療鍜屾帰娴嬫娴嬶紱鎷掔粷鏈嶅姟妫?祴銆佸悗闂ㄦ娴嬩互鍙?IDS 鍥為伩妫?祴銆?br />
路瀵规敾鍑讳富鍔ㄦ嫤鎴?SNS璁惧鍙互宸ヤ綔鍦ㄩ?鏄庢ā寮忎笅锛屽湪涓嶆敼鍙樼綉缁滅粨鏋勭殑鍓嶆彁涓嬶紝鑷姩鎷︽埅闈炴硶鐨勭綉缁滆闂紝瀹炵幇涓诲姩闃插尽銆?br />
路娣峰悎妫?祴浣撶郴缁撴瀯锛岃瘑鍒浂鏃堕棿鏀诲嚮銆係NS缁勫悎鍗忚寮傚父妫?祴銆佺姸鎬佺壒寰佺鍚嶃?婕忔礊鏀诲嚮鎷︽埅銆侀?淇¢?鐜囩洃鎺с?IDS 閫冮伩澶勭悊銆佹暟鎹祦绛栫暐鍐茬獊銆両P 鍦板潃鎷嗗垎閲嶇粍浠ュ強鑷畾涔夊寮虹壒寰佺鍚嶆弿杩拌瑷?潵鏀堕泦鎭舵剰娲诲姩鐨勮瘉鎹?SNS 7100 鐨勫崗璁紓甯告娴嬫湁鍔╀簬妫?祴浠ュ墠鏈煡鐨勬敾鍑诲拰鏂版敾鍑伙紙鍦ㄥ畠浠彂鐢熸椂妫?祴锛夈?姝ゅ姛鑳界О涓衡?闆舵椂闂粹?妫?祴銆?br />
路瀹炴椂浜嬩欢鍏宠仈鍜屽垎鏋愶紝蹇?瀹氫綅浼佷笟缃戝▉鑳佹潵婧愩?SNS鐨勫叧鑱斿拰鍒嗘瀽寮曟搸鍙护鎺夊啑浣欐暟鎹?鍙垎鏋愮浉鍏充俊鎭紝浠庤?浣垮緱鎻愪緵鐨勫▉鑳侀?鐭ヤ笉浼氬嚭鐜版暟鎹秴杞姐?SNS 浣跨敤璺ㄨ妭鐐瑰垎鏋愬湪浼佷笟缃戝唴鏀堕泦淇℃伅锛屼粠鑰屽揩閫熷湴甯姪绠$悊鍛樺紕娓呮瓒嬪娍骞跺湪鐩稿叧浜嬩欢鍜屼簨鏁呭彂鐢熸椂璇嗗埆瀹冧滑銆?br />
路鑷姩鐨凷ymantec 瀹夊叏鏇存柊銆傛潵鑷?Symantec 瀹夊叏鍝嶅簲涓績鐨勫畾鏈熴?蹇?鍝嶅簲 瀹夊叏鏇存柊鍙彁渚涙渶浣崇殑瀹夊叏淇濇姢鍜屾渶鏂扮殑瀹夊叏涓婁笅鏂囦俊鎭紝鍖呮嫭鍒╃敤鍜屾紡娲炰俊鎭?浜嬩欢璇存槑浠ュ強鐢ㄤ簬闃插尽涓嶆柇澧炲鐨勫▉鑳佺殑浜嬩欢缁嗗寲瑙勫垯銆傝繖浜涙搷浣滃ぇ澶у噺灏戜簡浼佷笟绠$悊鍛樼殑缁存姢宸ヤ綔閲忋?

鐢辨鎴戜滑鍙互鐪嬪嚭锛岃禌闂ㄩ搧鍏嬫彁渚涚殑涓皬浼佷笟鍏ヤ镜闃叉姢绯荤粺锛屼笉浠呯潃鐪间簬灏嗕腑灏忎紒涓氱殑瀹夊叏闃叉姢姘村钩鎻愬崌鍒颁笌鐜伴樁娈靛畨鍏ㄥ▉鑳佺浉閫傚簲鐨勬柊楂樺害锛屾洿浠庨儴缃层?缁存姢鐨勪究鍒╂?锛屽崌绾с?绠$悊鐨勭畝渚挎?涓婏紝璁╀腑灏忎紒涓氱殑淇℃伅瀹夊叏闃叉姢锛岀湡姝d粠鈥滄帺鑰崇洍閾冣?浼肩殑鐩茬洰涔愯杞彉涓衡?鎴愮鍦ㄨ兏鈥濈殑瀹夋灂鏃犲咖銆?br />


Mov to mpeg converter

Qualcomm CEO: WiMax 3G will COMPETE in the face of setbacks

Golden Abacus eAM State Assets Bureau Haizhu District, Guangzhou presence

Jinshan Jinshan Nu Pi typing Through repeated fake "Li Gui," poisonous pit Users

blackberry video Formats

Shop Dictionaries Education

.mov to .avi converter free

The first part of the Win32 debugging API

Secret benefits TO customers Shi Xiaoen

Organization process Definition

Operators tangle: 3G what is THE best billing

Top Clipboard Tools

Trade more "smoothly" to prevent the risk of more

Good Mail Servers

F4v Converter Free

Report Timers And Time Synch

No comments:

Post a Comment