Network Security: An MPE/iX Overview
page 367/22/2008
HP presentation template user tutorial
WRAPUP
• Continue to monitor and evolve
• Listen to CERT bulletins and evaluate those to your systems
• Network with industry acquaintances for possibly new styles of
attacks
• Try to be proactive
• Formalize a security strategy:
– WHO is accessing your data?
– WHAT is the key resource(s) you need to protect?
– WHEN is data access expected?
– WHERE are your users who are accessing your data?