Four Steps to Improved Security: Prevention, Detection, Forensics and
by Jim Cavanagh
The four steps to improved security are prevention, detection, forensics and response. Prevention is the superior strategy as it discourages any would-be attacker from applying their craft in the first place. If prevention is not effective a security breach or compromise must be detected, and reported. Next, forensics come into play to assure the breach can be proven and appropriate steps, such as closing the vulnerability and/or prosecuting the perpetrator can be taken. At that point an effective response can be mounted in a timely fashion.
This research report is reproduced by special arrangement with our partner, The Consultant Registry.
About the author:
James P. Cavanagh has been intimately involved with sales, marketing, engineering, public and private network design, installation and training of ATM, Frame Relay, IP, and DSL since their early commercialization. In the area of traditional consulting, Mr. Cavanagh boasts a long list of recognizable manufacturers in the emerging IP networking arena, as well as traditional telephony, carriers and service providers, and end-user organizations. Mr. Cavanagh has helped his clients with everything from product specification to network procurement, design, integration, installation and engineering.
Mr. Cavanagh is the editor of books on multimedia networking and network security, as well as author of Frame Relay Applications: Business and Technology Case Studies. He is currently writing a book on optical networking, and starting a new web site covering domestic US and International telecom regulatory and legal issues. Mr. Cavanagh is also a frequent guest on panels at industry conferences, has been an instructor for the International Communications Association's (ICA) Summer Program at the University of Colorado at Boulder since 1992. Additionally, Mr. Cavanagh also provides training on ATM, Frame Relay, Emerging Technologies, LAN and TCP/IP Integration, Telecom and Datacom Fundamentals and a variety of other subjects.
Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information. Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site. Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.