Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server 2008 Security Resource Kit (PRO - Resource Kit)

Buy

In your opinion, which network faces the biggest security risk today: the small office with multiple power users or large corporation with a large LUA base?

The unmanaged networks. I have seen very well managed and very secure networks in both small and large organizations, and I have seen poorly managed and very insecure networks in both as well. It is not really a matter of size but of how much time and effort is put into the security aspects of it. One of the largest weaknesses seems to be training. Security today is about end-points. The attacks are against people far more prevalent than those against technology and vulnerabilities. We need to, as an industry, understand how to push the security out to the assets that we are trying to protect. In the past we have centralized security because it was a way to centralize management of security. The challenge now is to de-centralize security, while still permitting centralized management. This is a non-trivial task, but it must be done. As a starting point, I dare every IT manager to start analyzing the risks to his or her network, and specifically, what it is they want the network to be used for. Once you understand what it is you want the network to provide you have a chance to work on making it provide that and nothing else. To me, that is the most important thing we can do. A properly staffed IT group, with adequate training and resources to train its users, an organizational mandate to protect the organization's assets, and a keen understanding of the business they serve will build a network that is adequately secured regardless of the size of the network. Windows Server 2008 certainly provides some very powerful technologies to help you manage security in your network, but while that is a necessary component, it is insufficient by itself. At a very base level, it is about the people and the processes you have, more than about the technology. Technology will help, but it is just a tool that your people will implement using a process that helps or hurts.

About the Author

Jesper Johansson, Ph. D. in Management Information Systems, has 20 years experience in information technology security. He is a security architect for a large e-commerce company, responsible for application security strategy across the range of properties and services. Prior, he was a security manager for Microsoft Corporation. He is author of several TechNet Magazine security articles and is a co-author of two other security books, Protect Your Windows Network and Windows Vista Security. When he is not working on information security, he teaches scuba diving.

The Windows Server Security Team designs, develops, tests, and supports Windows Server security solutions for Microsoft.

(HTML tags aren't allowed.)

Trends in Interactive Visualization: State-of-the-Art Survey (Advanced Information and Knowledge Processing)
Trends in Interactive Visualization: State-of-the-Art Survey (Advanced Information and Knowledge Processing)
The purpose of Interactive Visualization is to develop new scientific methods to increase scientists’ abilities to explore data and to understand better the results of experiments based on extensive calculations. These techniques not only provide users with a possibility to view the data but also permit them to use interaction capabilities to...
Visual Basic Programmer's Guide to the .NET Framework Class Library (Kaleidoscope)
Visual Basic Programmer's Guide to the .NET Framework Class Library (Kaleidoscope)
Visual Basic Programmer's Guide to the .NET Framework Class Library is the definitive guide every Visual Basic .NET developer needs to understand the capabilities of .NET namespaces and increase productivity inside the .NET framework. Lars Powersand Mike Snell have provided a comprehensive book that details the capabilities of the key namespaces,...
Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...


Imaging of Parasitic Diseases
Imaging of Parasitic Diseases

With parasitic diseases increasing worldwide it’s vitally important that radiologists in particular stay up to date with developments. In this brilliantly useful volume, the authors cover the imaging findings for parasitic diseases that can affect the human body using modern imaging equipments. Every chapter consists of a short...

Lonely Planet Ecuador & the Galapagos Islands (Country Guide)
Lonely Planet Ecuador & the Galapagos Islands (Country Guide)

“Colonial cities, misty cloud forests, towering Andean peaks, Amazonian rainforest and the otherworldly Galapagos: for such a small country Ecuador has a stunning array of natural and cultural wonders.” – Regis St Louis, Lonely Planet Writer

Our Promise
You can trust our travel information
...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy