(1) Consolidation and pooling of all SMEs websites that are meant for eCommerce, eTransaction into a professionally run SME web portal infrastructure that are secured and protected against public hacking for a fees.
(2) Public Telco Infrastructure Perimeter Defense – to do the 1st line of defense – to sniff out anomaly attack pattern. To protect and mitigate against DDOS (Distributed Denial of Service) using Internet Clean Pipe - before it hit the Enterprise Web Portal.
(3) Create physical barrier (and protect the chokepoint) - Enterprise Infrastructure Perimeter Defense, End-point security defense – based on sound, secured design to create a barrier to protect against public hacking.
(4) Security expert in doing the hackers’ role (to detect infiltrated unauthorised elements – such as malware, spyware, Trojans, viruses etc) – to do vulnerability scanning on the infrastructure to detect loopholes or vulnerabilities, content filtering / viruses scanning to detect any hidden and dormant foreign malicious elements, tapping metadata search technology to sniff out all possible hacking techniques and build a honeypot to invite attack and detect new attack pattern – and plug the loopholes.
Facing the world at large – where international hackers come in all form and shape – the challenges are huge and mammoth. But when the sparring start – it will be the battle of wits.
(2) Public Telco Infrastructure Perimeter Defense – to do the 1st line of defense – to sniff out anomaly attack pattern. To protect and mitigate against DDOS (Distributed Denial of Service) using Internet Clean Pipe - before it hit the Enterprise Web Portal.
(3) Create physical barrier (and protect the chokepoint) - Enterprise Infrastructure Perimeter Defense, End-point security defense – based on sound, secured design to create a barrier to protect against public hacking.
(4) Security expert in doing the hackers’ role (to detect infiltrated unauthorised elements – such as malware, spyware, Trojans, viruses etc) – to do vulnerability scanning on the infrastructure to detect loopholes or vulnerabilities, content filtering / viruses scanning to detect any hidden and dormant foreign malicious elements, tapping metadata search technology to sniff out all possible hacking techniques and build a honeypot to invite attack and detect new attack pattern – and plug the loopholes.
Facing the world at large – where international hackers come in all form and shape – the challenges are huge and mammoth. But when the sparring start – it will be the battle of wits.
No comments:
Post a Comment