The Community for Technology Leaders
RSS Icon
Issue No.03 - May/June (2010 vol.12)
pp: 11-13
Bruce Potter , Ponte Technologies
<p>In December 2009, Google and several other companies admitted they had been targeted by sophisticated attackers. Practically overnight, the tenor of the IT security discussion changed. Although many organizations are now focusing on advanced defensive capabilities to combat the advanced threat, let's not forget about the basic, commonsense aspects of running a network.</p>
Network security, firewalls, password policy, APT, Aurora, information technology, security &#x0026; privacy
Bruce Potter, "Common Sense for Your Network", IT Professional, vol.12, no. 3, pp. 11-13, May/June 2010, doi:10.1109/MITP.2010.86
1. "Sebelius and Napolitano Hold Briefing on Gov't's H1N1 Response,", 27 Oct. 2009, PyHTue9cEp9 Janet+Napolitano.
2. G. Venere, "An Insight into the Aurora Communication Protocol," McAfee Labs Blog, 18 Jan. 2010, 2010/01/18an-insight-into-the-aurora-communication-protocol .
3. "Operation Aurora, Zero-day IE Flaw and Google Hacking—Don't Panic!" InfosecEvents, 28 Jan. 2010, operation-aurora-zero-day-ie-flaw-and-google-hacking-dont-panic.html .
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool