NCJ Number
194964
Journal
Journal of Counterterrorism & Homeland Security Int'l Volume: 8 Issue: 2 Dated: 2002 Pages: 4-5
Date Published
2002
Length
2 pages
Annotation
This article discusses possible security countermeasures in the protection of information technology (IT) networks across the United States.
Abstract
Recent studies have indicated that in cyber warfare the enemy is often hidden within our own ranks and that two-thirds of corporate information technology (IT) network attacks originate from inside a company. It was noted that multiple security measures are necessary to reduce the amount of risk to IT networks. One such countermeasure identified was the Intrusion Detection System (IDS). The IDS supplements the firewall security and performs as an early warning system or burglar alarm. One of the most important security measures is the implementation of a Security Policies and Procedures document. The document articulates an organization’s vision and philosophy for a secure environment and minimizes insider threat. In addition to the above, physical information technology was identified as equally important in defining countermeasures within a network perimeter.