Security, what is it? well, it is our way of keeping safe against harm.
Security can be against external or internal threats. There are companies that have very secret information, that should stay internally without getting public and leaking outside, so they take measures to keep the information internal and prevent it from leaking outside by following certain security protocols. The same idea is being taken in order to prevent external access to that delicate secret information.
The main issue with security is that many resources need to be shared, some need external access to reach the internet or another resource of information on external servers. Since there are programs running on both sides, which gain different access privileges, there is always the risk of exposure. The security technologies need to close all of those risks, by minimizing
accessibility, using secured protocols and exposing only the data that we have to expose, so we will reduce risk to a minimum.
The best way to secure everything is to only work locally and of course in a very secured facility that no one is allowed to exit or enter the facility 🙂 ha ha ha – that sounds far fetched, so if there are people there, they will not see daylight until they die. Since this is a nice thought but not really doable, we have to understand that we need to take some risk in order to function properly, and sharing info is part of using computers, so there is some risk involved.
The fact that there is some risk to it all, means we need to secure those risks and try and reduce to minimize the exposure risk. That is why we have security technologies, to help us achieve that goal.
Now, I will try and go over some of the security technologies that are being used and available today, as far as I could find. There are many different types of security techniques and technologies which are being used, and I will probably won’t be able to cover them all, but I am sure you will get some idea of what is out there and what we can use. I am not giving the actual solutions, only the techniques we can use today and there are tools that can be used to perform those techniques.
Securing the network:
We have technologies that enable to secure our network by using these techniques:
- Monitor and identify secured login– making sure only authorized access is granted.
- Penetration testing – always perform penetration scenarios, to make sure all aspects are covered and we are still protected. This also assists in discovering holes, a breach or changes in regular mechanisms (like if a hacker has changed something, like some code in one of the systems that enable him access or pull out info).
- There are tools that give you managed and controlled supervised solution on what goes where and what comes in, mostly based on a web monitoring system that can be securely accessed from anywhere, or if we choose only internally. Those mechanisms can identify changes and close them to tighten security.
- Anti-virus tools can keep threats quarantined or eliminated, so they won’t be used by those who sent them to gain information on our system or harm our system.
- There are many different firewalls that can guard our WAN/LAN networks from harm. Those firewalls maintain the traffic we allow or disallow between branches, or on internet access. They are the WALL that keeps us safe and they are getting more sophisticated and more secured which makes them harder to breach.
- There are intrusion detection and prevention tools which provide comprehensive safety against threats that might arise.
- There are security tools that supervise downloads and application installations. This prevents people from downloading harmful and unauthorized software and installing them on our system.
- E-mails are a real big threat if it is unsupervised. There is much spam out there that reaches our mail server, and different e-mails that contain threats. There are security technologies that enable mail supervision and control over harmful e-mails, to either be tagged, quarantined, or destroyed depends on the definitions defined and security policies.
- There are tools that check and manage vulnerability by using the software as a service (SAAS) approach.
- Encryption technologies are out there using higher cipher bits, which can lock files and folders, which can guard/block the network secured protocols etc…
- There are safeguarding tools, that protect boots and secured hard-disks using state of the art encryption using innovative technologies.
- There are technologies based on intrusion prevention solutions (IPS), which uses snort detection engines that defend corporate networks from continuous attacks, during and after the attacks.
- The security technology consists of both Software and Hardware solutions. There are many different types of security appliances.
I believe this covers much of what security enables today and you can find some further information within these website links.
http://www.cstl.com/Solutions/Network-Security.asp
http://csrc.nist.gov/
http://www.microsoft.com/security/default.aspx
http://www.amazon.com/Fundamentals-Computer-Security-Technology-Amoroso/dp/0131089293
http://www.peterindia.net/ITSecurity.html
http://www.itsecurity.com/
http://www.cstl.com/CST/
http://en.wikipedia.org/wiki/Information_security
18 Comments to 'computer security technology'
15/10/2010
Excuse for that I interfere … To me this situation is familiar. Let’s discuss.
Greetings from the Speedy DNS
20/10/2010
Thanks.
Greetings from the Speedy DNS.
21/01/2011
Found this on MSN and I’m glad I did. Amazing article.
08/02/2011
Your nice blog is merely worth a read if anyone results in it. Im lucky i did so because now Ive got an entirely new view of this kind of. I didnt realise this issue was so important and so universal. You definitely placed it in perspective for everyone, thanks for the fantatic advice.
08/02/2011
My neighbor and I were simply debating this specific subject, he is normally seeking to show me incorrect. Your view on this is great and exactly how I truly feel. I just now mailed him this website online to indicate him your individual view. After wanting over your website I e book marked and can be coming back to learn your new posts!
25/02/2011
Lots of interesting info there =D. I hope you will put up more posts!!!
26/02/2011
Thanks for your article! Frankly speaking I have never read anything that informative.
03/03/2011
Hey dude! Nice website ! I really liked being here.
09/03/2011
I cannot wait to learn to read more of this fantastic topic. So much of it Ive never even idea of. You sure did put a good solid twist on something that Ive heard a whole lot about. I dont believe Ive actually read any situation that does this subject nearly as good justice as you merely did.
09/03/2011
I found your webpage on google and read a number of your other posts. i just added you to my own Google News Reader. Keep up the good work expect reading more from you in the future.
21/04/2011
Merely wanna remark on few general things, The website design is perfect, the subject matter is real fantastic : D.
05/08/2011
Awesome post this will help me!
20/10/2011
This is the best weblog i have ever seen. Thanks for publicing this usefull information. I will come back in a few days to see you have post some new articles.
07/08/2019
Hello, Neat post. There’s a problem with your web site in internet explorer, may check this?
IE nonetheless is the marketplace chief and a good component of other people
will pass over your wonderful writing due to this problem.
08/08/2020
Usually I do not learn post on blogs, but I would like to say that this write-up very forced me to take a
look at and do it! Your writing taste has been surprised me.
Thank you, quite nice article.
08/08/2020
I absolutely love your blog and find a lot of your post’s to be precisely what I’m
looking for. Does one offer guest writers to write
content in your case? I wouldn’t mind publishing a post or elaborating on many of the subjects you write concerning
here. Again, awesome blog!
08/08/2020
Howdy! This article could not be written any better! Looking
through this article reminds me of my previous roommate!
He constantly kept preaching about this. I’ll forward this post
to him. Pretty sure he’ll have a very good read.
Thank you for sharing!
09/08/2020
I am regular visitor, how are you everybody?
This post posted at this web site is genuinely
nice.
Leave a comment