Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What technology is used to deal with malicious attacks (encryption, firewalls, etc)?

0
Posted

What technology is used to deal with malicious attacks (encryption, firewalls, etc)?

0

Dial-in to our network is not allowed from outside and we do not allow access to LAN from outside using Internet. We allow selected employees to access outlook e-mails using VPN over Internet. To ensure an adequate and comprehensive ISM, monitoring controls such as password management and physical security were used to augment technical controls like firewalls and IPS. We have implemented Linux based Security Solution which include firewall / IDS Sensors / Syslog Server for managing the network devices. Syslog’s are maintained for period of one month. LAN is divided logically through VLAN’s according to the Project Requirements. We have created a separate VLAN for the management of all the Devices. Any configuration change is controlled by the change control process. All the security process is governed by our security policy manual. c. Business Continuity & Disaster Recovery In today’s highly competitive environment, businesses need to continuously innovate to meet the expectations of

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123