INTRODUCTION
Basic approach
Identifying the assets,
Identifying theThreads
NETWORK SECURITY THREATS AND ATTACKS
SECURITY MEASURES
1. Security Policy
2. Security Awareness
3. Monitor Access
4. Routine Backups:
5. Integrity Checks:
6. Check Reusable Passwords:
7. Audit
8. Secure Mobility
9. Physical Security
10. Limit Access
TOOLS FOR INFORMATION SECURITY
Firewalls
Encryption
Public-Key Algorithms
Private-Key Algorithms
- Data Encryption Standard (DES)
- RC4
- Stream (SSH Communications Security, 1999).
- International Data Encryption Algorithm (IDEA)
Security Protocols
System Audits
Physical Security
DEVELOPING AN EFFECTIVE NETWORK SECURITY POLICY
3. Determine the Cost of Security Measures
4. Limit the Scope of Access
5. Identify Assumptions
6. Consider Human Factors
7. Control the Number of Secrets
8. Limit Your Trust
9. Understand Typical Network Functions
10. Realize Physical Security
11. Implement Pervasive and Scalable Security
4. Limit the Scope of Access
5. Identify Assumptions
6. Consider Human Factors
7. Control the Number of Secrets
8. Limit Your Trust
9. Understand Typical Network Functions
10. Realize Physical Security
11. Implement Pervasive and Scalable Security
SUMMARY
Developing a network security policy comprises of identifying the organizational assets, threats, and risks as well as evaluating and implementing the tools and technologies available to meet these risks. When all these factors are accounted for, a usage policy is then developed. In addition, an auditing procedure that reviews network and server usage must be established on a timely basis. A proper response should also be in place before any breach or breakdown occurs.
CONCLUSION
After taking a look at many tools and options available for security, there are a lot of similarities between a security policy and Linus’ security blanket. The fiber that makes up the blanket consists of the many tools and services used in a security policy; the firewalls, biometrics, passwords, access
Controls and documentation all are combined to cover the assets of the company. Along with the fiber that makes up a blanket, there also is a border that holds it all together, making it easy to unfold and use. For a security program, the border consists of common sense, a return on the security investment and diligence in implementing and operating the security program. Pro-grams that are bound too tight or are created in a convoluted manner actually might end up being a detriment to the company. Security plans should be reviewed regularly, easy to use and enforceable throughout the organization.
No comments:
Post a Comment
its cool