Cyber Security Basics: Protect your organization by applying the fundamentals
Author:Franke, Don [Franke, Don]
Language: eng
Format: azw3
Published: 2016-01-29T16:00:00+00:00
Figure 1.16: A proxy determines whether or not to let user web site requests proceed to the Internet.
Having a proxy in place to intercept web site requests also lets the security team explicitly add blocks to a policy in response to information (or “intel”) received about sites that host a malicious payload. A web proxy should be considered essential for any organization that allows Internet access from a production network.
As there is the risk of blocking legitimate sites, and the need to have staff available for adding and removing sites in a timely manner, this is considered a level 2 security objective.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(21441)
Hello! Python by Anthony Briggs(20695)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(19130)
Dependency Injection in .NET by Mark Seemann(18771)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(18368)
Kotlin in Action by Dmitry Jemerov(18123)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(18025)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16942)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(16863)
Grails in Action by Glen Smith Peter Ledbrook(16000)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(13716)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(11736)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(10601)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10582)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(9669)
Hit Refresh by Satya Nadella(9093)
The Kubernetes Operator Framework Book by Michael Dame(8530)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8353)
Robo-Advisor with Python by Aki Ranin(8299)