RSA: A Guide to Security Technologies - A Primer for IT Professionals, RSA Security Inc. 1999, pp. 48.

YEAR: 1999
Login Login
User: Anonymous

LABEL: Authentication
THINGS: Firewall | Hacker | Integrity | IPsec | Non-repudiation | PKIX | Privacy | SSL | S/MIME
TIME: 1999
Information security has emerged as one of the most important segments of the
computing industry. Organizations the world over are adopting new, Internet-based
approaches to enhance communication, increase customer satisfaction and reduce
costs. Security is the enabler that makes these new approaches suitable for commercial
use. Technologies such as firewalls, Virtual Private Network (VPN) connections, session
encryption, digital certificates and others are now entering the mainstream of business
computing; each offers, in its own way, an important stepping stone for companies
looking to advance further into the next generation of open computing and
electronic commerce.
Yet it is not a straightforward path. There is no one solution or approach that solves all
information security problems. Making matters worse, the technologies and protocols
that are the foundation of security approaches can be abstract, complex and difficult
to grasp. And practically every day it seems a new protocol, technology or strategic
alliance is announced that promises to change the complexion of the information
security marketplace.
As a result, network managers and IT professionals are left on their own, to piece
together a patchwork of systems that may or may not adequately address the real
security risks confronting their organizations. A Guide to Security Technologies was
created for this audience, and is intended to be a primer, to make the complicated
issues behind security technology easier to understand, and thereby easier to apply
as enablers of strategic business initiatives.
This Guide provides information on:
1) the major threats to information security;
2) the key concepts which are the foundation of information security measures;
3) the leading security technology implementations;
4) related industry standards. With this information in hand, it is hoped that security
managers and IT professionals can make better-informed decisions about today’s
security options, and also have the necessary context for understanding continuing
advances in security technology.