- Banners (1)
Telling hackers to go away
- Scanners (25)
Programs that scan a network looking for ways hackers
can break in.
- Anti-spam (15)
Tools to prevent spam from entering your network, or
prevent your network from being used to relay spam to other people.
- Authentication (25)
Common password protection systems for the entire network.
- Intrusion Detection (31)
Watches what's going on in order to catch hackers in the act.
Prevents prying eyes from reading your private data
by encoding it behind mathematical algorithms.
- Firewalls (53)
Puts a fence around your systems allowing people in only
at carefully controled checkpoints.
- Hardening (0)
Locking down systems to prevent intrusion
- Policy (4)
The most important countermeasure, knowing what you are going to
do to prevent an attack -- and how to respond to one when it occurs.
- TEMPEST (3)
A rare, but important concern in government circles
about escaping electromagnetic radiation that might
- VPN (37)
Virtual Private Networks, allow users from accross the Internet
to connect as if their were local.
- Services (1)
Hiring "ethical hackers" to help set up, and test, the security of your network.