Security Solution Evolution
Takings these trends one step further, here we provide a general overview of the current and future technologies. These solutions span security for the gateway/ server/client, applications security, and overall management of your information security program. Figure 8-5 provides a summary of these solutions.
Figure 8-5. Solution evolution.
Existing technology relies upon two major methods for protection: signatures and anomaly detection. Signatures identify an attack or suspicious file based upon a known differentiating property. A header section of an email message with the words ...