self defending network
#1

Hi niki here
i m final year student n hv 2 gv a seminar on self defending networks..
so i need a seminar report or as much details on self defending networks as a reference so dat i can prepare my own using that..
thanking u.
Reply
#2
More Info About self defending network




some brief explanation about the self defending network from cisco is :::--

Cisco Self-Defending Network: Combining Best-of-Breed Products and Services with a Systems Approach
A new generation of interactive business communication and collaboration technologies provides tremendous productivity and flexibility gains for organizations of all kinds. But this unprecedented connectivity also unleashes new, complex security risks, including:

Increased exposure to security threats—Ubiquitous access to Web-enabled applications and services enables users to work from anywhere, anytime—but also places businesses at risk anywhere, anytime.

An eroding network perimeter—The traditional network barriers that separated trusted from untrusted and “inside” from “outside” are now disappearing. As more applications become directly accessible to remote users and systems, the concept of the network perimeter becomes increasingly vague and more difficult to protect.

Evolving threats—Information attacks of the past were largely an issue of cyber-vandalism, with hackers primarily looking for fame. Today’s attacks are a profit-driven business, often controlled by organized crime. The modern attacker uses a patient, “stealth” approach to eventually achieve a successful attack. In addition, modern attackers often avoid technology defenses, using spam, phishing attacks, and fraudulent Web links to target an organization’s weakest link: human beings.
As security risks have evolved, so have organizations’ approaches to them. Where information security was once a technology issue, today it is a business issue—representing a more significant cost and operational challenge, but a fundamental business enabler as well. More and more organizations are implementing formal programs to reduce IT risk, especially security and compliance risks. As regulatory compliance becomes a core requirement for organizations in more industries, businesses must develop new capabilities for controlling the kinds of information traversing their network, how that information is used, and who can access it. Organizations not only face the challenge of becoming compliant, but of staying compliant as the network continuously evolves with business needs.
“When we build a security environment that is flexible, manageable, and layered, we can handle any new challenges that may appear. Our Cisco solution definitely gives us this capability.”
—Al Grapoli, network manager, State of Oregon
Organizations are wrestling with information security demands that span many overarching business challenges such as complying with regulatory requirements, preventing data loss, and blocking malware. The problem is that dealing with these types of challenges requires a true security solution—not just security products. To prevent data loss alone, for example, businesses need a combination of strong perimeter defenses, malware defenses, identity services, endpoint security, policy enforcement mechanisms, and security monitoring tools, as well as a strong plan
© 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.


refered by cisco site :::: http://ciscoen/US/solutions/collateral/ns340/ns394/ns171/net_brochure0900aecd800efd71.pdf




Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: self defending networks pdf, pdf about self defending networks, self defending network abstract, self defending network paper download, self defending network pdf, project of self defending network, self defending network wikipedia,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A New Data Mining Based Network Intrusion Detection Model prem0597 2 4,225 04-05-2018, 09:42 PM
Last Post: Guest
  development of road light gateway with sensor network ppt 2 1,811 15-04-2018, 05:30 PM
Last Post: Guest
  self inductance of a coil depends by observing the effect of this coil in a series with resistor in a circuit fed up by 2 1,469 01-10-2016, 09:27 PM
Last Post: Guest
  cryptography and network security by atul kahate pdf torrent 2 2,525 16-08-2016, 12:08 PM
Last Post: Guest
  necola motherboard network drivers free download 1 701 21-07-2016, 10:04 AM
Last Post: jaseela123d
  how to hack mtn network and free airtime and data 2 1,302 16-07-2016, 04:17 PM
Last Post: jaseela123d
  how to steal airtime from vodacom network 1 685 16-07-2016, 12:04 PM
Last Post: jaseela123d
  matlab code for steganography using wavelets neural network 1 652 05-07-2016, 12:21 PM
Last Post: visalakshik
  anna university question paper for network routing algorithm previous year questions 1 760 02-07-2016, 04:37 PM
Last Post: visalakshik
  self curing concrete ppt 1 628 18-06-2016, 11:17 AM
Last Post: dhanabhagya

Forum Jump: