Tuesday, 2024-03-19, 2:10 PM
Welcome Guest | RSS
Statistics

Total online: 1
Guests: 1
Users: 0
Site menu
Our Documentations
1* METASPLOIT
Blog Category
# Only for beginners [39]
This category contains some introductions and tutorials about UBUNTU and BACKTRACK for those who just start using LINUX.
# Computer Security [11]
In this category, you will find all courses about the Informatique Security
# LINUX [2]
EVERYTHING ABOUT LINUX - UBUNTU & BACKTRACK - (NEWS, VIDEOS, TUTORIALS, ... )
# BackTrack 5 Tutorials [6]
In this categorie, I will post all tutorials about BackTrack5 (Installation, Configuration, Update, Hacking...)
# TechnicDynamic Tutorials [12]
Technic Dynamic is a source of education focused in the following categories of technology: (Computer - Design - Gadgets - Networking - Security) Link : http://technicdynamic.com
# Vishnuvalentino Tutorials [2]
He is a computer security specialist, and also freelance website designer. Read more : http://vishnuvalentino.com/about/
# Hackers News [6]
All news about the hackers of the world ...
# Tools [18]
All Security Tools
MEMES PICTURES [0]
Entries archive
Shopping


Follow us
facebook
Main » 2012 » February » 01
Principles of computer security and market developments

Introduction

There are currently too often security architectures based solely on the prevention and perimeter defense. There are many other elements to compose a security architecture. Any security architecture (and more generally the same approach to security) must be based on a triptych as:

  • Prevention
  • Detection
  • Reaction

These three aspects are currently covered very differently by the market despite an undeniable necessity.


Prevention

Prevention is fundamental and is generally well understood by many. The principle: do everything you need to protect themselves. It is most often to adopt the following approach:

  1. Risk Analysis
  2. Defining a security policy
  3. Implementation of a solution focused on one or more firewalls.
  4. Audit of the solution
  5. Updates

The market today cover very well this approach: the consulting firms are very active in the risk analysis. Integrators propose and implement solutions with a vengeance. Companies specialize in security audits, others make the technological safe and can trigger updates (usually performed by the integrator).

... Read more »

Category: # Computer Security | Views: 731 | Added by: Administrator | Date: 2012-02-01 | Comments (0)

Securing your computer data: 
What issues your business?


Computer data in the heart of your business


    In 2005, about 218 European companies, more than 50% have suffered financial losses related to  
computer problems. The same year, another study highlighted that only 30% of companies had taken  precautions to ensure the availability and reliability their data.




What are the risks for computer data? 

There are different types of risks to company data, the main ones are:
  • viruses and malware
  • fraudulent email,
  • piracy
  • industrial espionage,
  • embezzlement,
  • the loss of confidential information,
  • the error handling.
        

Category: # Computer Security | Views: 737 | Added by: Administrator | Date: 2012-02-01 | Comments (0)

Visitors

Share This On:
Google Translator
Search
Login form
Our poll
Rate my site
Total of answers: 20
Clock & Calendar

«  February 2012  »
SuMoTuWeThFrSa
   1234
567891011
12131415161718
19202122232425
26272829