When the need arises to protect selected user workstations from intrusion and virus epidemics,
the administrator usually has to visit each computer to manually install and configure its firewall
to comply with corporate security policies. Practically always, the same settings and tools are
used with each workstation. In complex distributed networks this requires an administrator to
spend a lot of time duplicating the same sets of operations multiple times. Moreover, the
administrator must manually reapply all modifications made by each individual user.
Additionally, each client itself has to download firewall updates that in large networks may result
in excessive Internet...
Nội dung trích xuất từ tài liệu:
Taxonomy of Conflicts in Network Security Policies
Taxonomy of Conflicts in Network Security Policies
Số trang: 8
Loại file: pdf
Dung lượng: 301.21 KB
Lượt xem: 27
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Tìm kiếm theo từ khóa liên quan:
Poland – Organization Availability and Space IL-2 Based Immune Cell Homeostasis Oxidative Stress Health and DiseaseTài liệu có liên quan:
-
12 trang 57 0 0
-
29 trang 55 0 0
-
46 trang 48 0 0
-
Scientific research in the media
119 trang 47 0 0 -
5 trang 46 0 0
-
Rewriting an All-Too-Familiar Story?
69 trang 46 0 0 -
Wisconsin Insurance Licensing Candidate Handbook
32 trang 41 0 0 -
280 trang 41 0 0
-
HOW TO FORM AESTHETIC BELIEF: INTERPRETING THE ACQUAINTANCE PRINCIPLE
15 trang 40 0 0 -
Characteristics of Lactobacillus strains isolated from Vietnamese patients with type 2 diabetes
10 trang 39 0 0