Full Disclosure mailing list archives
perfect security architecture (network)
From: C0BR4 <cobradead () gmail com>
Date: Mon, 8 Aug 2005 11:04:34 +0530
Hey guys, Have couple of questions need answers plz........... There are three attacks that jeopardize Information security. ------------------------------ - secure Network - ------------------------------ - secure Host - ------------------------------ - secure Application - ------------------------------- How can we optimize security? Stopping attacks at network or building secure applications.. How should we deal with these attacks? People talk about Firewall, IDS/IPS etc.. What's best? If asked to give a perfect security architecture (network) what would you suggest? Given a Firewall, Router, IDS, IPS and Anti-virus . thank you C0br4 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- perfect security architecture (network) C0BR4 (Aug 08)
- RE: perfect security architecture (network) Aditya Deshmukh (Aug 08)
- <Possible follow-ups>
- Re: perfect security architecture (network) Daniel H. Renner (Aug 08)
- RE: perfect security architecture (network) Charles Heselton (Aug 08)
- RE: perfect security architecture (network) Chuck Fullerton (Aug 08)
- RE: perfect security architecture (network) Charles Heselton (Aug 08)
- RE: perfect security architecture (network) Charles Heselton (Aug 09)
- Re: perfect security architecture (network) Aycan iRiCAN (Aug 09)
- Re: perfect security architecture (network) C0BR4 (Aug 10)
- RE: perfect security architecture (network) Chuck Fullerton (Aug 10)