Difference between revisions of "Defense mechanisms (firewalls/IDS/IPS)"

From ScenarioThinking
Jump to navigation Jump to search
(New page: ==Description== ==Enablers== ==Inhabitors== ==Paradigms== ==Experts== ==Timing== ==Web Resources==)
 
Line 1: Line 1:
==Description==
==Description==
Since the internet boom security is a growing concern. Software developers got more and more aware of the security threats posed upon their software systems. They began to implement development and testing practices to make their code more and more secure.
On a system and network level various appliances and software has been developed to prevent intrusion and attacks. Firewalls form the front line of defense against unwanted connections; other systems like Intrusion Detection Systems examine web traffic on a deeper level. Virus scanners and malware removers scan computers for malicious software and remove them. Most critical systems are not connected to the internet to prevent attacks from the outside.
Authentication methods are developed to identify the person accessing a system. These have evolved over the years and are becoming stronger and harder to bypass.


==Enablers==
==Enablers==

Revision as of 13:54, 11 May 2008

Description

Since the internet boom security is a growing concern. Software developers got more and more aware of the security threats posed upon their software systems. They began to implement development and testing practices to make their code more and more secure.

On a system and network level various appliances and software has been developed to prevent intrusion and attacks. Firewalls form the front line of defense against unwanted connections; other systems like Intrusion Detection Systems examine web traffic on a deeper level. Virus scanners and malware removers scan computers for malicious software and remove them. Most critical systems are not connected to the internet to prevent attacks from the outside.

Authentication methods are developed to identify the person accessing a system. These have evolved over the years and are becoming stronger and harder to bypass.

Enablers

Inhabitors

Paradigms

Experts

Timing

Web Resources