In: Computer Science
how is compartmentalization implemented into network security? give in-depth description
Compartmentalization in cyber security is exactly what the term lets us assume it would be. In order to reduce risks, experts employ a smart firewall and divide users into categories. Nevertheless, at this year’s RSA conference multiple vendors discussed a different type of compartmentalization.
Malware is on its way toward "zero-day" threats—the time between the announcement of a vulnerability and the implementation of its exploit is shrinking to mere days, even hours.
A proactive approach to security.
1- Unlike anti-virus, IDS, and after-the-fact patches, a proactive approach to security protects your assets against even unknown threats. Case in point: the Sobig.F worm caused the greatest damage at the start of its outbreak, before corporate IT departments could test and deploy the patches and AV patterns that were issued in response. In contrast, companies that had the foresight to employ proactive solutions like endpoint firewalls and well-planned network architecture were much less vulnerable to Sobig.F, even during the height of the epidemic