We live in a time when foreign nations no longer achieve supremacy by engaging in a traditional battlefield warfare. Most nations realized that there are considerable disadvantages to fighting the battle in the open by using the old-style weapons and mechanisms, which helped to establish an entirely new kind of combat, the information warfare. Instead of using heavy weaponry, the warfare operations are executed in secrecy primarily by leveraging the information and communication technology. As a result, the modern war has moved from a physical space into a virtual cyberspace.
The security breaches usually occur when the organization does not sufficiently restrict communication inside network perimeter or does not implement lateral security controls, which allow hackers to target the priority systems or infiltrate information. The following article talks about VMware’s NSX™ Distributed Firewall, Intrusion Preventions, and Intrusion Detection System.
Note: Article in Progress. The following is only a basic skeleton for the more comprehensive overview.
In the following article, I concentrate on some of the often-asked questions topic connected to ethical hacking, the area of computing concerned with the discovery of security vulnerabilities that can potentially be exploited by real hackers. [Read more…]