Главная
Study mode:
on
1
Intro
2
Infrastructure
3
High Connectivity
4
VPNs
5
Zones
6
Conduits
7
Unidirectional gateways
8
Network carries data
9
Database replication
10
State
11
State Transfer Device
12
Planning
13
Operationalize
14
Unidirectional Gateway
15
Why is this secure
16
Reliability
17
Science
18
The Law of Sufficient Variety
19
Doing Things Simple
20
HTTP Traffic Alert
21
Where does this belong
22
Vendors
23
Target
24
Protocols
Description:
Explore innovative approaches to enhancing data transfer security in this 42-minute conference talk from BSidesLV 2014. Delve into infrastructure considerations, high connectivity options, VPNs, and network zoning strategies. Learn about unidirectional gateways, database replication techniques, and the concept of state transfer devices. Discover how to plan and operationalize secure data transfer methods, with a focus on the science behind reliability and the Law of Sufficient Variety. Examine the benefits of simplifying processes and understand where these security measures fit within various protocols and vendor ecosystems. Gain insights into improving your organization's data transfer security posture while maintaining efficiency and effectiveness.

Improving Security by Avoiding Traffic and Still Get What You Want in Data Transfers

BSidesLV
Add to list