Question

In: Computer Science

how is compartmentalization implemented into network security? give in-depth description

how is compartmentalization implemented into network security? give in-depth description

Solutions

Expert Solution

Compartmentalization in cyber security is exactly what the term lets us assume it would be. In order to reduce risks, experts employ a smart firewall and divide users into categories. Nevertheless, at this year’s RSA conference multiple vendors discussed a different type of compartmentalization.

Malware is on its way toward "zero-day" threats—the time between the announcement of a vulnerability and the implementation of its exploit is shrinking to mere days, even hours.

A proactive approach to security.

1-  Unlike anti-virus, IDS, and after-the-fact patches, a proactive approach to security protects your assets against even unknown threats. Case in point: the Sobig.F worm caused the greatest damage at the start of its outbreak, before corporate IT departments could test and deploy the patches and AV patterns that were issued in response. In contrast, companies that had the foresight to employ proactive solutions like endpoint firewalls and well-planned network architecture were much less vulnerable to Sobig.F, even during the height of the epidemic

  • If you have to share drives, share with read-only access whenever possible. Don't forget to password-protect your shared drives to keep them safe from automated threats.
  • Restrict access to sensitive network resources and bandwidth on a user- and group-specific basis.
  • Prevent your employees from introducing rogue, unauthorized wireless access points into your network environment.
  • Track network usage by individual. Spikes in traffic from users can reveal initial virus outbreaks.

Related Solutions

Please give an in depth description of USA's economic and political systems. How would either of...
Please give an in depth description of USA's economic and political systems. How would either of these systems affect international trade?
Why is it important to have a Network Security? Discuss the use of network security components....
Why is it important to have a Network Security? Discuss the use of network security components. Why is it important to use Firewall for Computer Networks?
1.) In your own words, explain the how IP addressing is implemented in a network infrastructure....
1.) In your own words, explain the how IP addressing is implemented in a network infrastructure. Why is it important to know Subnetting and VLSM? 2.) Explain Functions at the OSI and TCP/IP Model Layers.
Define the scope of network security.
Define the scope of network security.
I need an in-depth description on how chronic aerobic training impacts the events at the neuromuscular...
I need an in-depth description on how chronic aerobic training impacts the events at the neuromuscular junction. Does it speed up the transmission of information or slow it down? What effects does this have on performance? What other variables influence these events
There are a variety of security mechanisms available to protect the enterprise network. Discuss how an...
There are a variety of security mechanisms available to protect the enterprise network. Discuss how an enterprise might be attacked and the type of security device or mechanism you would select to combat the attack. What would you envision as being the legal, social, and ethical implications of using the security device or mechanism?
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
Discuss network security in a business ethics.
Discuss network security in a business ethics.
There are a lot of networking and network security jobs and every IT company has network...
There are a lot of networking and network security jobs and every IT company has network engineers, admins, etc. Why and how do think understanding the OSI Model and Network Devices are important from a work standpoint? Looking for some original content.
give a description of how vaccines work. What do we inject and how does this give...
give a description of how vaccines work. What do we inject and how does this give us immunity? Be specific about how the cells work.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT