Abstract

This chapter focuses on securing computing environment. The common solution is virus protection, used to protect against malicious computer code. Intrusion detection software is recommended to monitor the network resources from outside trespassers. This software monitors for unauthorized probing or use of computing resources. Firewall software is the key component of security strategy as it provides the gateway to other networks. To protect the internal network, a firewall is generally placed between secured resources and public networks such as the Internet. The primary security mechanisms employed by Citrix Metaframe XP is encryption technology. Based on industry-standard mathematical algorithms, encryption is used to scramble data as it is transmitted across the network to prevent unauthorized users from accessing it. Using several different technologies, including symmetric keys, asymmetric keys, Secure Sockets Layer (SSL), and Citrix MetaFrame XP works completely to secure the entire server farm. The most common configuration includes independent computing architecture (ICA) encryption for server connections, published applications, and ICA client. SSL can be used via Secure Hypertext Transfer Protocol (HTTPS) for NFuse Web servers and the SSL Relay services for communication between Web servers and server farms. To support encryption technology, the ICA client device must be installed with 6.01 of the client software.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call