Full Disclosure mailing list archives
perfect security architecture (network)
From: C0BR4 <cobradead () gmail com>
Date: Mon, 8 Aug 2005 11:04:34 +0530
Hey guys,
Have couple of questions need answers plz...........
There are three attacks that jeopardize Information security.
------------------------------
- secure Network -
------------------------------
- secure Host -
------------------------------
- secure Application -
-------------------------------
How can we optimize security? Stopping attacks at network or building
secure applications..
How should we deal with these attacks? People talk about Firewall, IDS/IPS etc..
What's best?
If asked to give a perfect security architecture (network) what would
you suggest? Given
a Firewall, Router, IDS, IPS and Anti-virus .
thank you
C0br4
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- perfect security architecture (network) C0BR4 (Aug 08)
- RE: perfect security architecture (network) Aditya Deshmukh (Aug 08)
- <Possible follow-ups>
- Re: perfect security architecture (network) Daniel H. Renner (Aug 08)
- RE: perfect security architecture (network) Charles Heselton (Aug 08)
- RE: perfect security architecture (network) Chuck Fullerton (Aug 08)
- RE: perfect security architecture (network) Charles Heselton (Aug 08)
- RE: perfect security architecture (network) Charles Heselton (Aug 09)
- Re: perfect security architecture (network) Aycan iRiCAN (Aug 09)
- Re: perfect security architecture (network) C0BR4 (Aug 10)
- RE: perfect security architecture (network) Chuck Fullerton (Aug 10)
