NCJ Number
              194964
          Journal
  Journal of Counterterrorism & Homeland Security Int'l Volume: 8 Issue: 2 Dated: 2002 Pages: 4-5
Date Published
  2002
Length
              2 pages
          Annotation
              This article discusses possible security countermeasures in the protection of information technology (IT) networks across the United States.
          Abstract
              Recent studies have indicated that in cyber warfare the enemy is often hidden within our own ranks and that two-thirds of corporate information technology (IT) network attacks originate from inside a company. It was noted that multiple security measures are necessary to reduce the amount of risk to IT networks. One such countermeasure identified was the Intrusion Detection System (IDS). The IDS supplements the firewall security and performs as an early warning system or burglar alarm. One of the most important security measures is the implementation of a Security Policies and Procedures document. The document articulates an organization’s vision and philosophy for a secure environment and minimizes insider threat. In addition to the above, physical information technology was identified as equally important in defining countermeasures within a network perimeter.
          