{"title":"Network Security Basics","authors":"Stephen Northcutt","doi":"10.1002/9781119505877.ch8","DOIUrl":null,"url":null,"abstract":"There are exactly two keys to information security or information assurance: first, configure the system and network correctly and keep it that way. Because this is impossible to do perfectly, the second key to information assurance is to know the traffic coming into and out of your network.[1] That way, if something terrible is happening you can detect it. Therefore, all the tasks that have to be done in network security break down into three phases or classes:","PeriodicalId":51851,"journal":{"name":"Information Security Journal","volume":"32 1","pages":""},"PeriodicalIF":1.6000,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/9781119505877.ch8","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
There are exactly two keys to information security or information assurance: first, configure the system and network correctly and keep it that way. Because this is impossible to do perfectly, the second key to information assurance is to know the traffic coming into and out of your network.[1] That way, if something terrible is happening you can detect it. Therefore, all the tasks that have to be done in network security break down into three phases or classes:
期刊介绍:
Information Security Journal: A Global Perspective aims to inform security professionals about new technologies, useful tools, and relevant research in policy and technology. We also seek to provide insight into current and existing professional development issues. We welcome submissions that cover the following topics: Security Access Control Systems and Security Methodology Security Telecommunications and Network Security Business Continuity Planning and Disaster Recovery Planning Security Management Practices Security Architecture and Models Law, Investigation, and Ethics in Information Security Application and Systems Development Security Cryptography security Computer Operations Security Physical Security We are especially keen to receive manuscripts that explore Cloud Security, Health Care Information Security and Privacy and Cyber Forensics