Choosing Security Solutions That Use Public Key Technology |
The open nature of today's enterprise promotes information exchange and collaboration on an unprecedented level. However, the very nature of open networks makes it more difficult for organizations to protect valuable network resources and business information.
In a recent Computer Security Institute survey, 64 percent of the 520 respondents reported computer security breaches in a
Although Internet Protocol (IP) networks such as private intranets and the public Internet provide for open communication between users and computers, they are vulnerable to compromised security and malicious attack by intruders. Information sent over IP networks is open to anyone who can gain access to the network. Authorized network users, as well as intruders, can view, modify, and disrupt IP network communications easily by using software tools that are readily available on the Internet. Both internal users and external intruders can exploit the open nature of IP networks to do any of the following:
Both the software industry and the Internet community have developed a wide range of new technologies and standards to address these problems and improve the security and privacy of information on open networks.