Network Security: An MPE/iX Overview

page 367/22/2008
HP presentation template user tutorial
WRAPUP
Continue to monitor and evolve
Listen to CERT bulletins and evaluate those to your systems
Network with industry acquaintances for possibly new styles of
attacks
Try to be proactive
Formalize a security strategy:
WHO is accessing your data?
WHAT is the key resource(s) you need to protect?
WHEN is data access expected?
WHERE are your users who are accessing your data?