Difference between revisions of "Defense mechanisms (firewalls/IDS/IPS)"
Line 1: | Line 1: | ||
==Description== | ==Description== | ||
Since the internet boom security is a growing concern. | Since the internet boom security is a growing concern. The opportunity of cyber warfare is a tradeoff between the offensive tools and the defensive mechanisms.<br><br> | ||
Software developers have become more and more aware of the security threats posed upon their software systems. They began to implement development and testing practices to make their code more and more secure.<br><br> | |||
Authentication methods are developed to identify the person accessing a system. These have evolved over the years and are becoming stronger and harder to bypass. | On a system and network level various appliances and software has been developed to prevent intrusion and attacks. Firewalls form the front line of defense against unwanted connections; other systems like Intrusion Detection Systems examine web traffic on a deeper level. Virus scanners and malware removers scan computers for malicious software and remove them. Most critical systems are not connected to the internet to prevent attacks from the outside. The architecture of networks has gotten more complex and secure due to features like VLANs that the newest network appliances offer.<br><br> | ||
Authentication methods are developed to identify the person accessing a system. These have evolved over the years and are becoming stronger and harder to bypass.<br> | |||
==Enablers== | ==Enablers== |
Revision as of 10:49, 18 May 2008
Description
Since the internet boom security is a growing concern. The opportunity of cyber warfare is a tradeoff between the offensive tools and the defensive mechanisms.
Software developers have become more and more aware of the security threats posed upon their software systems. They began to implement development and testing practices to make their code more and more secure.
On a system and network level various appliances and software has been developed to prevent intrusion and attacks. Firewalls form the front line of defense against unwanted connections; other systems like Intrusion Detection Systems examine web traffic on a deeper level. Virus scanners and malware removers scan computers for malicious software and remove them. Most critical systems are not connected to the internet to prevent attacks from the outside. The architecture of networks has gotten more complex and secure due to features like VLANs that the newest network appliances offer.
Authentication methods are developed to identify the person accessing a system. These have evolved over the years and are becoming stronger and harder to bypass.
Enablers
Offensive tools
Software Architecture
Development of Computer Science
Budget
Awareness of risks
Inhabitors
Budget
Complexity of bugfree software
Knowledge of vulnurabilities
Paradigms
There is a growing awareness of vulnurabilities in software and nowadays security is high on the agenda of software development and architecture.
Experts
Sources for additional information about this driving force. (if you have found people, put the links to them)
Timing
Dates for key milestones in the development of the driving force.
Web Resources
Useful resources on the web relating to this force.