Security Solution Evolution
Takings these trends one step further, here we provide a general overview of the current and future technologies. These solutions span security for the gateway/ server/client, applications security, and overall management of your information security program. Figure 8-5 provides a summary of these solutions.
Figure 8-5. Solution evolution.
Gateway/Server/Client Security—Today
Existing technology relies upon two major methods for protection: signatures and anomaly detection. Signatures identify an attack or suspicious file based upon a known differentiating property. A header section of an email message with the words ...
Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.