Library items tagged: technical guide

Anonymous
Networks are a key part of the Grid vision, so network design must be considered as part of a Grid deployment. The physical networks to which Grid systems are connected, the allocation of IP addresses and the use of appropriate network controls can all have significant benefits for the performance and security of a Grid. Conversely, if these issues are not included in the early planning they can cause endless problems.
Anonymous
Aspects of Grid Protocols
Anonymous
Grid computing uses a distributed architecture to let teams of researchers in different physical locations and time zones collaborate on large scale projects in many disciplines. It is a novel application that involves new models of computing and new network protocols. Grids require complex and dynamic patterns of trust to be established and implemented, with computers relying on one another to make decisions on the identity and rights of individual users.
Anonymous
Section 2: Methods of Countering the Threats UCISA: Information Security Toolkit UCISA: Model Regulations SANS: Critical Security Controls
Anonymous
6.1 Janet Policies Any organisation connecting to Janet is required to abide by three policies established to support the role of the network in enabling education and research. These are as follows:
Anonymous
5.1 Policy Filtering in the Backbone Routers
Anonymous
4.1 Use of Filters Within Routers for Network Access Control
Anonymous
Connecting an insecure computer to a network places that computer, its users and any information it contains at risk. Insecure computers also represent a threat to other computers, users and information on the network, since intruders frequently use one compromised machine to attack others either simply by using it to generate network traffic in a distributed denial of service attack, or more subtly by using the access that the compromised computer or its users have to compromise others.
Anonymous
There are two main technical approaches that an organisation can use to address security issues
Anonymous
1.1 Connecting to the Internet