Subscribe to Zinmag Tribune
Subscribe to Zinmag Tribune
Subscribe to Zinmag Tribune by mail
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFtIlEjRMI7O1p9ehBpkcWJujTEBLBUN9B9o9d_N-ZR1gZJId9BSMbmyPEtOvPKsT7IgAPNJZpUUWzUIexHar1W1GFxqly7S0mLAvyYVYSgju0ytpX-aJFMVcVDBCoxHhCipRwy6gv1FM/s1600/banner_amikom.gif
STMIK AMIKOM Towards a Research University
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTYG9BnheQXoUQfDTM0iMu7di5DSf9LyQgiZgt4KGpGV56YTeIovMWxWWw0lcBMH5baDhSlE81kEaid5SKuRT2PUTrwhyX7Xeltks-9glYvKogaLYgg_OeZD2tTTO7kZM-1xVa4zfYEWY/s320/_jet_computer_3.jpg
Computer as a Communication Tool World
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbUfAiaqJIWXzSSRqiLre9Ru5iI4tdWkL9c_tKRBHz35YjsK25LOnGNIwV2k74h3z1bRpRviTLemkPQLSuxDiZNfle_1qtdG0KsRi22yCgmpHVXR97TyEseWgC-Lbs3Z3D8BhCUnsdvxI/s320/social-media-people.jpg
Build a Future Assets
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinrJMBmgCn5TBFcg52ogqSBd1GfQYWi8_to6txTb4SNiwmIpQUyLmBb8Z4sN6xh3BWp08B8CWZNBS_9iG7hiecu9DXGfciVqYIMJBsZ2_8qWtHRILSpb02wHFBEYJrPhfQDhiDcQjQhAw/s1600/566_americas_next_top_model_468.jpg
Top Asian Model

Business

Run The Berfect Business
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHqmTCjJBMak-W53S77ItBSuOeepUhFNOzq6sDZCxGr9xYPRIrpnJRPfjPYFN1Zlq5qZbXrFhx100Ov7C_emQKOBQLoXV81qvM7f4rcEhdi0u4QX4sD7Zy4Gxod7utwI8DDncxqCjNI-4/s320/business.jpg

General Computer

Resurrection Of The Future With Advances In Technology
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHFmsEpOOB5s6DHm-3PFv0vLjYy8gs4RoATliQiun5w6S4yvvcKzRIfeUQmE302icPtZ7GNgHuLVcs27usABn_TZTPJHTxUY3EUPDpQPp1pdwPrtEPEYO4vzkj1bpSIsyzxa2V9lKuT_w/s200/computer_data_180_1441.jpg

Business

Run The Berfect Business
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPpvxFvQt1D1ICAphvJIrOlbs-0cN8Z47NiIyTvP6pcFSye8Dk6xduEMBvT1SvesbG8Yx7m8I5cW87jvG1mHaTraHxJEySiMFrTEgUQf_LZS0aACHHpojN-renU7Gd46JaSkqTWZLl580/s1600/karte_nova_media_en.png

BusinessE

Run The Berfect Business
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWLRV7D8jKAG8_b528U0uTFxlQvOb_upMRCiOxacPjvZbFbW1JfjlitDJNmuY1NoPYV35a41SeuvByEzVofthwd8iigISsO3wuUmbgwf1cB6labo-6tjRFfnIxEZYklA8lTd0lAyu4rlU/s320/business-plan-picture.jpg

Missed Packets: The Enemy of Your AUP

5:31 PM Reporter: fendhy
When it comes to defending the integrity and reputation of a corporation, one of the primary lines of defense will be your Acceptable Use Protocols (AUP). The diligence and attention you dedicate to your AUP, however, can be completely sidestepped by just one missed packet. So how can you remain vigilant, defend your AUP and enforce it without missing a packet?

Overcoming Human Error

Programs are only as strong as their programming. Whether you employ a software or hardware appliance for your network-filtering device; you will need to update it. There are virtually thousands of sites created weekly. Many of those sites are just one step ahead of the law and when you consider the measures they are willing to undertake, it is not inconceivable that they may be one step ahead of your filter.

The temptation to handle personal business while at work can be too great for some employees. Communication, for example, with relatives and friends while at work via Instant Messages or email are part of the corporate record just as any other business communication transaction that takes place. Employees may not be aware of the impact of their actions, but the responsible corporation should be.

Since it is possible for just a single typo to send an employee to a website of questionable intent, you have to compensate for human error. While the majority of your employees will abide by the AUP, making a typo is not about intent. If your filtering appliance is not capable of verifying the requested web site against an object list of questionable or acceptable sites – then your employee may find themselves staring at a site filled with pornography or worse, coping with an automatic download that implants questionable material or viruses onto your network.

Clogged Arteries of Communication

Software-based filters may have to run several checks and re-checks when they receive a website request. The checking and rechecking consumes valuable bandwidth and, depending on the number of employees trying to use the network at the same time, packets can get dropped or missed when the network arteries become clogged.

Unfortunately, the very nature of software checking requires the use of excessive bandwidth. If the network lines become too clogged, you may be faced with a network outage or failure. The latency caused by software operations is bad enough; however, the software failure can leave even more packets missed or skipped. Employees could find themselves staring at sites that violate their company's AUP.

To deal with these complications, a self-contained hardware-based filter can help your network avoid missed packets and maintain optimum throughput time. In particular, an Interent filtering appliance that employs Kernel-Level Filtering can give you the speed of pass by and the accuracy of pass through technologies. Such a system would have its own hardened and optimized OS so that latency and missed packets aren't a problem with which you must contend.

Hardware is Hardwired

A true hardware solution is far more accurate than software solutions that rely on heuristic-based filtering to do the job. First of all, a true hardware appliance is not limited by bandwidth. Requests are sent directly to the hardware device and filtering and reporting are all on-box.

Because all the action takes place on the hardware device, the end user is not limited by network capacity nor are they clogging the network up with repeated checks and cross checks.

Hardware filtering devices can also be updated daily and customized to a corporation's specific AUP standards. The daily updates allow corporations to compensate for the hundreds of new sites created daily that can't be as readily updated with software-based applications. Another important distinction would be to have critical security sites updated hourly. This would ensure maximum protection for your organization. A hardware-filtering device is the best defense for your AUP against objectionable content, IM, P2P and spyware.

#Security

Read more...

Search This Blog

Search Google

featured-video

Labels

My Blog List

Followers