Requires Free Membership to View
- Single point of failure
- Loose security policies
- support protection
- Limitation of technology
- False sense of security
- Weak encryption
- Latency risks
- What is at risk?
- What is its value?
- What are the threats?
- What is the probability of occurrence?
- Open architecture
- Packet filteration
- Default to denial
- Auditing capabilities
- Access control
- Logging capabilities
- Intrusion detection
- Extended user authentication
- Secured subnets
- Strong encryption
- Network management systems
- Secure back-up
- Stateful inspection
- Real-time traffic monitoring & alerting system
- Device management
- Secure tunneling
This was first published in August 2005
Network Management Strategies for the CIO

Join the conversationComment
Share
Comments
Results
Contribute to the conversation