Monday, August 25, 2008

Hacker (Computer Security)

In a security context, a hacker is someone involved in computer security/insecurity, specializing in the discovery of exploits in systems (for exploitation or prevention), or in obtaining or preventing unauthorized access to systems through skills, tactics and detailed knowledge. In the most common general form of this usage, "hacker" refers to a black-hat hacker (a malicious or criminal hacker). There are also ethical hackers (more commonly referred to as white hats), and those more ethically ambiguous (grey hats). To disambiguate the term hacker, often cracker is used instead, referring either to computer security hacker culture as a whole to demarcate it from the academic hacker culture (such as by Eric S. Raymond[1]) or specifically to make a distinction within the computer security context between black-hat hackers and the more ethically positive hackers (commonly known as the white-hat hackers). The context of computer security hacking forms a subculture which is often referred to as the network hacker subculture or simply the computer underground. According to its adherents, cultural values center around the idea of creative and extraordinary computer usage. Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.

Saturday, August 23, 2008

Security

Reduce or prevent evolving threats - View the Adaptive Threat Management webcast

Trends such as the dynamic perimeter, and the deployment of content-rich and collaborative applications are driving escalating demands for securing, optimizing and having visibility and control across the network. These trends are also driving the need to have a high-performance network in which network and application layer security are an integral part of its core networking functionality, which is a critical enabler for organizations to securely deploy more applications and technologies.

Juniper Networks best-in-class security solutions provide successful mitigation of threats, protect the network against downtime and loss by controlling access to network resources, and ensure risk management and adherence to corporate governance requirements.