SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Check Point Software (CHKP) -- Ignore unavailable to you. Want to Upgrade?


To: TimeToMakeTheInvs who wrote (2851)6/25/1998 11:38:00 AM
From: Frank  Read Replies (3) | Respond to of 7150
 
Time and Av,

I've updated my web site if your interested in reading my comments.

members.tripod.com



To: TimeToMakeTheInvs who wrote (2851)6/25/1998 10:12:00 PM
From: jttmab  Respond to of 7150
 
You are correct in saying that there is a consensus recommendation to support IPSEC, though personally I don't share the enthusiasm. IPSEC has acknowledged problems both in security, such as the man-in-the-middle attack, as well as some implementation issues. For example, IPSEC hasn't yet addressed the multipath problem....in IP routing individual datagrams may take different paths, or routes along the network, if these paths involve other IPSEC compliant devices, keys will not likely be established for the session....Let's not also forget that IPSEC is a draft standard and IPSEC compliance is only deemed for a minimal set of poor security solutions such as 56-bit DES. Microsoft was responsible for PPTP, well known to be quite poor with respect to security; while the chief sponsor of SOCKS was NEC and does have the support of MS. You might find: aventail.com to be of interest in helping sort through these. (Note that the paper was prepared by Aventail, a SOCKS VPN vendor).

Re: Intrusion detection...Firewalls are a prevention technology while Intrusion detection is a technology that detects an intrusion when the firewall has failed or the attacker has found a way around the firewall. For instance, an employee may install an unauthorized modem on their PC at work to have access from home. An attacker will use a dialer on a set of exchanges known to the company looking for a modem connection and then use password attacks. One in the host, and behind the firewall, the attacker then has free reign over the network. An intrusion detection system will monitor host and more likely, network activity to determine unusual or unauthorized activity. IDSs are usually combined with User Misuse rules (the approach is similar) to again monitor network activity for unauthorized activity....e.g., cruising pornographic web sites during work hours.

VPNs, Firewalls, IDSs are complimentary technologies rather than competitive technologies. It could be argued that as VPNs become more prolific IDS technology becomes less effective since they generally monitor network traffic to determine policy violation.

Hope this helps.

Jim