足球竞猜app软件网络世界网络设计焦点 //m.banksfrench.com. en - us 星期一,2021年1月11日10:49:41 -0800 星期一,2021年1月11日10:49:41 -0800 https://idge.staticworld.net/nww/networkworld510x510.png. 足球竞猜app软件 m.banksfrench.com 510 510 https://idge.staticworld.net/nww/networkworld798x288.png 足球竞猜app软件 m.banksfrench.com 796 288. “可信威胁”:如何保护网络免受勒索软件 Thu, 29 Oct 2020 07:53:00 -0700 马克Dargin 马克Dargin

(Editor’s note, Oct. 29, 2020: With the FBI and US Department of Homeland Security recently warning of credible cyberthreats to healthcare facilities including ransomware, it’s a good time to review the steps outlined in this article that enterprises can take to guard against such attacks.)

Ransomware attacks are becoming more rampant now that criminals have learned they are an effective way to make money in a short amount of time.

Attackers do not even need any programming skills to launch an attack because they can obtain code that is shared among the many hacker communities. There are even services that will collect the ransom via Bitcoin on behalf of the attackers and just require them to pay a commission.

To read this article in full, please click here

//m.banksfrench.com/article/3218708/how-to-protect-your-network-from-ransomware-attacks.html#tk.rss_networkdesignspotlight 网络监控 安全 备份和恢复 灾难恢复 业务连续性 网络攻击
国家笔测试执行标准将提高网络安全性 星期五,2019年2月1日05:18:00 -0800 马克Dargin 马克Dargin

As the number of cyber attacks increases, the demand for penetration tests – to determine the strength of a company’s defense – is also going up. People are worried about their companies’ networks and computer systems being hacked and data being stolen. Plus, many regulatory standards such PCI and HITRUST require these tests to be performed on at least an annual basis.

The demand for these tests is only going to increase as attackers get more sophisticated. And it’s essential these tests catch all possible vulnerabilities.

Benefits and gaps of penetration tests

Penetration tests involve live tests of computer networks, systems, or web applications to find potential vulnerabilities. The tester actually attempts to exploit the vulnerabilities and documents the details of the results to their client. They document how severe the vulnerabilities are and recommend the steps that should be taken in order to resolve them.

To read this article in full, please click here

//m.banksfrench.com/article/3337531/national-pen-test-execution-standard-would-improve-network-security.html#tk.rss_networkdesignspotlight 网络安全 网络管理 网络 安全
争取网络中立规则的斗争势头强劲 星期二,2018年11月6日10:28:00 -0800 马克Dargin 马克Dargin

The U.S. Supreme Court has officially ended the court fight over the repealed net neutrality rules that required internet providers to treat all online traffic equally.

On Nov. 5, 2018, the court rejected appeals from the telecommunications industry seeking to throw out a lower court ruling in favor of the net neutrality rules. The Federal Communications Commission (FCC) under President Donald Trump has rolled back the rules, but the industry also wanted to completely remove the lower court’s ruling off the books.

The Supreme Court's decision is a victory for advocates of net neutrality rules, as supporters hope this will push Congress to enact new net neutrality laws or encourage other states to follow California’s lead by instituting their own requirements.

To read this article in full, please click here

//m.banksfrench.com/article/3319177/fight-for-net-neutrality-rules-gains-momentum.html#tk.rss_networkdesignspotlight 互联网
如何保护您的基础架构免受DNS缓存毒害 8月16日星期四08:01:00 -0700 马克Dargin 马克Dargin

Domain Name System (DNS) is our root of trust and is one of the most critical components of the internet. It is a mission-critical service because if it goes down, a business’s web presence goes down.

DNS is a virtual database of names and numbers. It serves as the backbone for other services critical to organizations. This includes email, internet site access, voice over internet protocol (VoIP), and the management of files.

You hope that when you type a domain name that you are really going where you are supposed to go. DNS vulnerabilities do not get much attention until an actual attack occurs and makes the news. For example, in April 2018, public DNS servers that managed the domain for Myetherwallet were hijacked and customers were redirected to a phishing site. Many users reported losing funds out of their account, and this brought a lot of public attention to DNS vulnerabilities.

To read this article in full, please click here

//m.banksfrench.com/article/3298160/how-to-protect-your-infrastructure-from-dns-cache-poishing.html#tk.rss_networkdesignspotlight 互联网 网络 安全
在没有网络中立的情况下为未来做好准备 2018年6月19日星期二05:38:00 -0700 马克Dargin 马克Dargin

Net neutrality officially ended on June 11, 2018, and many people are concerned that this is the end of an open internet. Many supporters of it believe the internet should be regulated no different than the phone system or power utility and that this change will decrease the performance of it. Opponents of net neutrality, argue that the end of it will now increase competition among the various internet service providers (ISPs) and increase coverage, improve performance, and lower costs.

What is net neutrality?

Net neutrality became effective by the Federal Communication Commission (FCC) under President Barack Obama in 2015. It is a set of rules that ensured ISPs treated all data transmissions, irrespective to content, that flowed through their infrastructure equally. Net neutrality protections prevented ISPs from slowing web services, blocking access to sites, or charging content organizations for faster delivery of streaming movies or videos. It is believed that antitrust laws did not go far enough in ensuring that all content received equal treatment.

To read this article in full, please click here

//m.banksfrench.com/article/3281337/prepare-for-the-future-without-net-neutrality.html#tk.rss_networkdesignspotlight 互联网 网络 网络监控
如果你的云提供商停止提供服务,该怎么办 2018年3月16日星期五07:55:00 -0700 马克Dargin 马克Dargin

What would your organization do if your cloud provider were to go out of business? What happens if your cloud provider suddenly stops offering critical services that your organization requires for its business to function properly? Businesses need to start asking these important questions and develop plans to address these scenarios.

The cloud is a new market that continues to grow, and there are more small players offering their services. According to Gartner, Cloud System Infrastructure Services (IaaS) are expected to grow from $45.8 billion in revenue in 2018 to $72.4 billion in 2020. As the market matures, it's only natural that some of these organizations will disappear or stop offering certain services. In 2013, Nirvanix stopped offering it cloud services and gave customers only two weeks’ notice to move their data off of their platform.

To read this article in full, please click here

//m.banksfrench.com/article/3263742/what-to-do-if-your-cloud-provider-stops-offering-its-services.html#tk.rss_networkdesignspotlight 业务连续性 2020欧洲杯预赛 灾难恢复 云计算
保护您的SDN控制器 星期二,02年1月2日10:50:00 -0800 马克Dargin 马克Dargin

Managing networks has become increasingly complex, and it will remain a challenge as the use of Internet of Things devices continues to grow. This complexity makes it difficult to reconfigure a traditional network in a timely manner to respond to malicious events or fix configuration errors.

A software-defined network (SDN) can help by giving network engineers the flexibility to dynamically change the behavior of a network on a node-by-node basis — something not typically available in a traditional network. An SDN uses virtualization to simplify the management of network resources and offers a solution for increased capacity without significantly increasing costs.

To read this article in full, please click here

//m.banksfrench.com/article/3245173/secure-your-sdn-controller.html#tk.rss_networkdesignspotlight SDN 网络 安全 虚拟化
提高您的网络安全性:部署一个蜜罐 星期二,2017年10月24日09:19:00 -0700 马克Dargin 马克Dargin

Have you ever wondered how a hacker breaks into a live system? Would you like to keep any potential attacker occupied so you can gather information about him without the use of a production system? Would you like to immediately detect when an attacker attempts to log into your system or retrieve data? 

One way to see and do those things is to deploy a honeypot. It’s a system on your network that acts as a decoy and lures potential hackers like bears get lured to honey. Honeypots do not contain any live data or information, but they can contain false information. Also, a honeypot should prevent the intruder from accessing protected areas of your network.

To read this article in full, please click here

//m.banksfrench.com/article/3234692/increase-your-network-security-deploy-a-honeypot.html#tk.rss_networkdesignspotlight 网络 安全 网络管理 网络监控
始终使用WAN模拟器测试远程应用程序的性能 星期二,2017年9月19日11:11:00 -0700 马克Dargin 马克Dargin

Many organizations deploy new applications for their remote site users without testing it on a WAN. Not testing these applications across a simulated WAN increases the possibility of performance issues during the early stages of usage because you have no idea how the application will perform once latency or jitter come in between the communication path of the client and server. 

If the application uses large amounts of bandwidth that causes congestion, then it can negatively affect the performance of other applications that share the bandwidth. A WAN emulator can enable you to measure the average bandwidth that an application may use before you deploy it. 

To read this article in full, please click here

//m.banksfrench.com/article/3226729/always-test-remote-app-performance-with-a- wan-emulator.html#tk.rss_networkdesignspotlight. w 网络 应用绩效管理
从IPv4迁移到IPv6的4个步骤 星期二,08年8月06日06:45:00 -0700 马克Dargin 马克Dargin

With the depletion of IPv4 addresses, more organizations are encouraged to transition over to using IPv6 addresses. Many organizations are noticing the benefits of the built-in security features of IPv6. Also, enterprise IT managers are observing that their service providers are successfully using IPv6, and this encourages them to move forward with it.

To continue to ignore IPv6 could cause any number of potential problems, including an inability to immediately migrate to IPv6 when there is no longer a choice, loss of internet connectivity, and not being able to compete with organizations whose systems are configured for IPv6.

To read this article in full, please click here

//m.banksfrench.com/article/3214388/how-to-plan-your-migration-to-ipv6.html#tk.rss_networkdesignspotlight 网络 网络管理 互联网 IPv6.
是时候考虑使用IPv6了 星期一,2017年6月26日08:27:00 -0700 马克Dargin 马克Dargin

Organizations should consider migrating their network infrastructure and devices over to IPv6. It may be a challenge to persuade leadership to prioritize it over other projects such as cloud computing or big data migrations, but it is essential to start planning for a migration.

Many service providers, such as Comcast, Verizon and AT&T, have already started using IPv6 addresses and are presently encouraging other organizations across the United States to do the same. The Internet Engineering Task Force (IETF) has encouraged organizations to move forward with these migrations for over a decade, and with more devices connecting to the internet, the need has increased. 

To read this article in full, please click here

//m.banksfrench.com/article/3203708/time-to-consider-a-move-to-ipv6.html#tk.rss_networkdesignspotlight 网络 网络管理 IPv6.
云中受保护的健康信息安全吗? 2017年5月18日星期四04:00:00 -0700 马克Dargin 马克Dargin

Many healthcare providers face the decision on if they should store protected health information (PHI) in the cloud. There are benefits and concerns to storing PHI in the cloud, and the decision to do so should be analyzed.

PHI is any health-related or insurance payment information that is stored or managed by a healthcare provider that can identify a specific individual. Examples of PHI are patient names, addresses, Social Security numbers, X-ray images, lab results, insurance payment information and medical records. Even information about a patient’s planned future procedures is PHI. Government regulation of PHI is covered in the HIPPA Privacy Rule, and all healthcare providers in the United States must adhere to it or face fines.

To read this article in full, please click here

//m.banksfrench.com/article/3197336/ is-protected-health-information-safe-in-the-cloud.html#tk.rss_networkdesignspotlight. 云计算 云安全 云存储 公共云
使用公共Wi-Fi时,如何保护你的资料 2017年5月03日星期三07:13:00 -0700 马克Dargin 马克Dargin

Many people are not aware of this, but Wi-Fi hotspots at Starbucks, Barnes & Noble or your local hotel that offers it as a complimentary service are not safe for confidential browsing, performing financial transactions or for viewing your emails.

Public Wi-Fi does not offer encryption for individuals using the same password and hotspot. Also, your signals are broadcast across the immediate area. It is easy for someone else within your vicinity to eavesdrop on your communication. An unskilled hacker can intercept your signal using a phony hotspot or a tampering software that can be found on a search engine.

+ Also on Network World: 4 lesser-known Wi-Fi security threats and how to defend against them +

The first task of a hacker is to get on the same network as the potential victim, then they can carry out that task with a public Wi-Fi network because they have the password. It does not matter if a network password is given out by the cashier or printed in your hotel room's welcome packet, once public, your security is compromised.

To read this article in full, please click here

//m.banksfrench.com/article/3194005/how-to-protect-your-data-when-using-public-wi-fi.html#tk.rss_networkdesignspotlight. 移动 无线网络 安全 网络安全 网络安全 小型企业
如何防止跨站请求伪造攻击 Tue, 18 Apr 2017 03:45:00 -0700 马克Dargin 马克Dargin

Cross-site request forgery (CSRF) attacks are becoming a more common attack method used by hackers. These attacks take advantage of the trust a website has for a user’s input and browser. The victim is tricked into performing a specific action they were not intending to do on a legitimate website; where they are authenticated to.

CSRF attacks will use the identity and privileges that the victim has on the website to impersonate them and perform malicious activity or transactions. Attackers will attempt to take advantage of users who have login cookies stored in their browsers. Ecommerce sites that send cookies to store user authentication data are vulnerable to this attack.

To read this article in full, please click here

//m.banksfrench.com/article/3190444/how-to-protect-against-cross-site-request-forgery-attacks.html#tk.rss_networkdesignspotlight 安全 App 保护 网络安全
分支机构IP电话通过Internet VPN还是MPLS通信? 星期一,4月10日2017 08:28:00 -0700 马克Dargin 马克Dargin

Many businesses with branch offices that have IP-enabled phones must decide what type of circuit medium to use for their communication to the corporate headquarters site.

Two of the most selected choices are a MPLS circuit or internet VPN. Both solutions have their pros and cons, and what is best can depend on your business requirements. Speed, quality of service (QoS), security and cost are the key factors you should consider when making this decision.

Pros and cons of an internet VPN

A significant advantage of using an internet VPN for communication is the cost. Most times, a branch site can use its existing internet connection for communication back to its headquarters. Usually, a 10 Mbps internet circuit costs much less than a 10 Mbps MPLS circuit. This can encourage a business to purchase more bandwidth for their branch site.

To read this article in full, please click here

//m.banksfrench.com/article/3188666/internet-vpn-or-mpls-for-branch-office-ip-phone-communication.html#tk.rss_networkdesignspotlight 统一通信 IP语音 网络 网络管理 MPLS
加密对于保护移动设备数据至关重要 星期一,2017年4月3日06:04:00 -0700 马克Dargin 马克Dargin

If your mobile device contains any personal or private data, then it's crucial you protect it. In many cases, mobile devices contain sensitive information that, if breached, can cause significant problems for the users.

For example, more people are storing copies of their driver’s license, employer data, insurance details, social security card, bank account information and passwords on their mobile device. Even personal pictures can be a major security concern. When applying for loans, instead of faxing, many people take pictures of important financial documents and email them to the requestor but do not delete the pictures from their phone.

One very critical step you can take to secure this is to encrypt your mobile data.

To read this article in full, please click here

//m.banksfrench.com/article/3187091/encryption-critical-for-protecting-mobile-device-data.html#tk.rss_networkdesignspotlight. 安全 移动 智能手机 平板电脑 端点保护 小型企业