Question

In: Computer Science

how is compartmentalization implemented into network security? give in-depth description

how is compartmentalization implemented into network security? give in-depth description

Solutions

Expert Solution

Compartmentalization in cyber security is exactly what the term lets us assume it would be. In order to reduce risks, experts employ a smart firewall and divide users into categories. Nevertheless, at this year’s RSA conference multiple vendors discussed a different type of compartmentalization.

Malware is on its way toward "zero-day" threats—the time between the announcement of a vulnerability and the implementation of its exploit is shrinking to mere days, even hours.

A proactive approach to security.

1-  Unlike anti-virus, IDS, and after-the-fact patches, a proactive approach to security protects your assets against even unknown threats. Case in point: the Sobig.F worm caused the greatest damage at the start of its outbreak, before corporate IT departments could test and deploy the patches and AV patterns that were issued in response. In contrast, companies that had the foresight to employ proactive solutions like endpoint firewalls and well-planned network architecture were much less vulnerable to Sobig.F, even during the height of the epidemic

  • If you have to share drives, share with read-only access whenever possible. Don't forget to password-protect your shared drives to keep them safe from automated threats.
  • Restrict access to sensitive network resources and bandwidth on a user- and group-specific basis.
  • Prevent your employees from introducing rogue, unauthorized wireless access points into your network environment.
  • Track network usage by individual. Spikes in traffic from users can reveal initial virus outbreaks.

Related Solutions

Please give an in depth description of USA's economic and political systems. How would either of...
Please give an in depth description of USA's economic and political systems. How would either of these systems affect international trade?
Define the scope of network security.
Define the scope of network security.
1.) In your own words, explain the how IP addressing is implemented in a network infrastructure....
1.) In your own words, explain the how IP addressing is implemented in a network infrastructure. Why is it important to know Subnetting and VLSM? 2.) Explain Functions at the OSI and TCP/IP Model Layers.
I need an in-depth description on how chronic aerobic training impacts the events at the neuromuscular...
I need an in-depth description on how chronic aerobic training impacts the events at the neuromuscular junction. Does it speed up the transmission of information or slow it down? What effects does this have on performance? What other variables influence these events
What are the differences and similarities between security, network security, and computer security in IT fields?
What are the differences and similarities between security, network security, and computer security in IT fields? Do the fields cover clearly delineated areas, or is there considerable overlap? Would you say that one of these areas is more technical than the other two?
Discuss network security in a business ethics.
Discuss network security in a business ethics.
Network Security: Explain in detail how a hash function could be used for each of the...
Network Security: Explain in detail how a hash function could be used for each of the following applications. Indicate which property or properties of the hash function are being used (one-way property, fixed length output, collision resistance, etc...). 1. to detect unauthorized modification of software program code 2. to identify the same files with different names on a peer-to-peer sharing network
give a description of how vaccines work. What do we inject and how does this give...
give a description of how vaccines work. What do we inject and how does this give us immunity? Be specific about how the cells work.
What is a network security assessment? The process of judging a security solution The process of...
What is a network security assessment? The process of judging a security solution The process of testing a security solution The process of evaluating a deployed security solution All of these are correct
1. Give an in depth explanation on how Le Chatelier's Principle affects equilibrium.
1. Give an in depth explanation on how Le Chatelier's Principle affects equilibrium.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT