Addressing your information security skills shortages
โ Scribed by Bill Pepper
- Book ID
- 104298128
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 225 KB
- Volume
- 16
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
rity control as one might imagine. Worse yet, part of Windows NT networking is based on old protocols (dating back to the 1970s when networking was in its infancy and when network security was hardly a concern). The fact that the same TCP/IP and UPD/UP services that have introduced so many security-related exposures in the Unix environment are now moving into the Windows NT arena further exacerbates the complications in achieving the needed level of security control in the network environment. This paper covers the protocols, networking mechanisms, and network services of Windows NT with a focus on existing security exposures. The final part covers solutions available both at an individual host level and also at the level of network security, with an emphasis on network infrastructure and traffic screening solutions.
๐ SIMILAR VOLUMES
Computers have become enmeshed in almost every aspect of modern life. While this development has made our lives easier and more convenient, it also opens us up to all sorts of security risks. The dozen activities in this volume emphasize the importance of computer security and delve into the steps t