You are here: hacking technology > firewall > Content
Hot Articles
Recommend Articles
New Articles
Establishment firewall initiative network security protection
  Add date: 07/11/2008   Publishing date: 07/11/2008   Hits: 37
Total 2 pages, Current page:1, Jump to page:
 
The firewall and other counter-virus class software are the very good security products, but must let your network system have the highest rank security rating, but also needs you to have certain initiative.
 
  Are you can pay attention each kind of news every day and so on hacker attack, virus and worm invasion? However when you saw when these news, perhaps your system already received attacks. But the present, I must give you to introduce that one kind has the initiative network security model, through it, even if presents any new virus again, you may also feel to enterprise's network system felt relieved.

  Is similar in the firewall or the counter-XX kind of software (for example counter-virus, anti-spam, counter-espionage software and so on), is belongs passively or is the response security measure. When attack arrival, this kind of software can have the corresponding resistance movement, they may take an entire security system's part, but, you also need to establish one kind to have the initiative security model, protects any unknown attack, protects the network security. Moreover, although maintains in the security aspect time vigilant is very essential, but very little has the enterprise to have the ability 24 hours in fact uninterruptedly to send for the protection network.

  Before realizing one to have the initiative network security construction, you need to have a general understanding to the existing mainstream network security system. Protection method including four aspects: Firewall, VPN, counter-viral software, as well as invasion examination system (IDS). The firewall may examine the data packet and attempt to prevent to have the question data packet, but it cannot distinguish the invasion, moreover sometimes the useful data packet impediment. VPN is establishes one in two unsafe computers between the private channel which protects, but it cannot protect in the network the material. The counter-viral software is inseparable with its own rule, moreover facing the hacker attack, does not have what revolt ability basically. Similarly, the invasion examination system is also a pure stimulated reaction system, after the invasion occurs only will then have an action to perform.

  Although these four basic security measures to the enterprise very important, but in fact, an enterprise perhaps has spent over a million purchases and the establishment firewalls, VPN, the counter-viral software as well as the IDS system, but uses facing the hacker “the general crack approves the dew” the (CVE) method of attack actually appears helpless. CVE said essentially is the application procedure internal crack, it may by the hacker use, use for to attack the network, to steal the information, and causes the network meltdown. According to 2004 E-Crime Survey (2004 electronic crime investigation) showed that 90% network security problem are because CVE causes.

  How to realize the network firewall function

  Has the initiative network security pattern is to the above four security measure integrated management, causes the user to be possible to obtain the biggest security from these four security measures, simultaneously is also increases a crack management system management system for the user. In this kind of system, a more effective firewall may the correct interception data information. More effective counter-viral procedure less opportunities are activated, because attack system's viral quantity were less. But IDS has become a backup system, because the very few people can invade the system to activate the warning mechanism. But uses the crack management system management system to prevent the invasion which CVE brings is the overall system most important part.

 
Other pages: : 1 * 2 * Next>>
Prev:Individual firewall's truth Next:The network firewall maintenance network security is not careless

Comment:

Category: Home > firewall