Monday, November 18, 2019

Attack Prevention Article Evaluation Essay Example | Topics and Well Written Essays - 500 words

Attack Prevention Article Evaluation - Essay Example Before attempting to observe the issue, it is essential to understand the focal point of user domain itself. This is a huge focal point in managing security in IT networks. In essence, user domain is defined  as set of objects that allow a user to have controls and permissions. In essence, user domains can overlap. Another element of user domains is the fact that is allows users to possess segregation of duties. Segregation of duties allows users to have separate domains and grant permissions. User domains can range from simple user access accounts or it can be a specific domain such as sales, marketing, and managers.   Unlike traditional firewalls  that only guard the parameters of the traditional IT infrastructure, virtualization  firewalls  provide comprehensive security measures that monitor activity within clients. If one machine is to be attacked by a host, the other machine automatically copies data in almost dynamic time that the user is not aware of the situation. Clearly, that is a huge benefit for organizations since it allows them to have a safety net in case of an attack. The Intrusion Detection System (IDS) is a critical precautionary tool that monitors the network through monitoring packets that are passed within users. The first and easiest application of virtualization for security purposes is known as application isolation. This is a huge component towards the security aspect because it allows IT managers to gain leverage over application stability and application allocation. One of the worst vulnerabilities for user domains are insider attacks. Insider attacks occur. For instance, denial of service and spoofing are one the most common themes that occur. The problem is the fact that intercepting authentication or other sensitive information can be executed with the current WAN technology since it utilizes the traditional TCP/IP in user domains. A

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.