Network Security: An MPE/iX Overview

page 217/22/2008
HP presentation template user tutorial
GENERAL NETWORKING
Methods of Defending a Network (cont)
Burglar alarms
Traps set on specific networked objects that go off if accessed
Honey pots
Dummy objects used to attract attacks. Range from single devices
to whole sub networks.
Vulnerability scanners
Tools that scan a network periodically for holes/open
gateways/misconfigured routers
Limited in scope because of potential damage to the network
Cryptography
Has potential, but complexity limits its use to local sites.