View
These are the top five security groups that are designed with any security model of society into account. These include security policies, perimeter, network, transaction costs and security monitoring. These are all part of an effective strategy for enterprise security. Every company has a perimeter network, all devices and circuits, which represents external networks, both public and private connection. The internal network consists of all servers,Applications, data and equipment used for business operations. The demilitarized zone (DMZ) is a position between the internal network and the extension of public servers and firewalls together. Allows some access for users outside the network server and block the traffic that would be to get to internal servers. This does not mean that all external users are denied access to internal networks. On the contrary, to prescribe an appropriate strategy of security, access to what and whowhere. For example, remote workers VPN concentrators will be used on the perimeter for Windows and Unix Servers. In addition to the business partner may be an extranet VPN connection to access the S/390 mainframe companies. Define what security is needed on all servers for enterprise applications and protect files. Identify the transaction logs needed to safeguard data while on the trip segments safe and unsafe network. Monitoring activities should be established that hisexamine the packets in real time as a defensive strategy and proactive protection against internal and external attacks. A recent survey has shown that internal attacks from disgruntled employees and consultants the most common attacks by hackers. Detection of the virus should be allowed, because the sessions of vectors capable of viruses at the application level with an e-mail or file transfer can be addressed.
Security Policy Document
The security policy document describesdifferent policies for all employees using the corporate network. It is determined that employees must do and by what means. The directive contains no employees and consultants, business partners finished, customers and employees. In addition to defining security policies for Internet e-mail and virus detection. It defines what is a cyclical process, if you are used to test and improve security.
Perimeter Security
This describes a firstLine of defense, external users need to authenticate the first network deal. There is no security for the traffic whose source and destination is an external network. Many components are used to protect the perimeter of a network. The evaluation of all devices currently in use in the scope. Typical perimeter devices, firewalls, external routers, servers, TACACS, RADIUS servers, dial-up servers, VPN concentrators and modems.
Network Security
This isdefined as all servers and legacy host security, which will be implemented for authentication and authorization, internal and external collaborators. If a user has been authenticated through the security perimeter, it is known that with the first of all applications should be treated. The network exists to carry data traffic between the workstation and network applications. Network applications are implemented on a shared server that can run an operating system like Windows, Unix or mainframeMVS. And 'responsibilities of the operating system to store data in order to respond to requests for data and maintain data security. Once a user is authenticated to a Windows ADS Domain with a specific user account, have the privileges that are granted to this account. These privileges would launch some directories on a server or server applications to access and manage some or all of the Windows server. When the user authenticates to the Windows Active Directory Servicesdistributed there is no special server. These are huge benefits and availability that since he received all the accounts from a security point of view of central and copies of the database are managed on different servers across the network. Unix and mainframe hosts usually require registration on a particular system, but the network rights can be distributed many hosts.
· Network domain operating system authentication and authorization
• Windows Active DirectoryAuthentication and authorization services
· Unix and mainframe series of authentication and authorization
· Server license for every application
• File and data approval
Transaction Security
Transaction Security working in a dynamic perspective. An attempt is made to ensure that each session, with five primary activities. It is non-repudiation, integrity, authentication, confidentiality, and virus detection. Security of transactions ensures that the session datais, before securing the entire enterprise, or transfer on the Internet. This is important when it comes to the Internet because the data is vulnerable to those who use the valuable information without permission would be. E-commerce has around industry standards such as SET and SSL, which is a set of protocols that describe how non-repudiation, integrity, authentication and confidentiality. In addition to virus detection provides transaction security by examining the data files for signs of virus infectionbefore it is sent to an internal user or before being transported over the Internet. Described below are industry standard protocols security of transactions.
Not resignation - RSA Digital Signatures
Integrity - MD5 authentication, the path
Authentication - Digital Certificates
Confidentiality - IPSec/IKE/3DES
Virus Detection - McAfee / Norton Anti Virus Software
Security monitoring
Monitoring network traffic for security threats,Vulnerability and unusual events for each security strategy is essential. This assessment will determine which strategies and applications that are used. Below is a list that describes some typical monitoring applications. Intrusion detection sensors are designed to monitor the traffic information in real time as you arrive at your perimeter. IBM Internet Security Scanner vulnerability assessment is an excellent tool for testing should be considered for your company. Syslog Server is a messagingStandard Unix program to many companies, security events to write a log file is located for testing. It 'important to include audit trails for changes in the network and contribute to the isolation of security issues. Large companies that use a lot of analog dial-up modem for dial-up scanners sometimes employ open lines that could be exploited by hackers to determine the security forces. Safety equipment is typically badge access to equipment and servers that host mission-critical data. Access badge systemskeeping time on each employee entering the space and telecommunications on the left. Cameras record sometimes, what specific activities were carried out as well.
Intrusion Prevention Sensor (IPS)
Cisco Intrusion Prevention sensors protect markets (IPS) to business customers to improve the security situation in the corporate network. Cisco IPS 4200 Series sensors are used in strategic locations inside and outside the network switches, routers andServer from hackers. IPS sensors monitored the network traffic in real time or offline, compared with pre-defined signatures packages. When the sensor detects suspicious behavior, it will send an alarm message, delete the package and some evasive maneuvers to counter the attack. Can the sensor line IPS IPS, IDS, where traffic flows are not used by the device or a hybrid device. Most of the sensors within the network of data centers is to counter the IPS mode with its dynamic characteristics are known security attackswhen they occur. Note that IOS intrusion prevention, today with the router as an option.
Vulnerability Assessment Test (VAST)
IBM Internet Security Scanner (ISS) is a vulnerability assessment scanner for enterprise customers to assess the vulnerability of the network from internal and external point of view. The software runs on agents and scans of various network devices and servers for known vulnerabilities and potential vulnerabilities.The process consists of network discovery, data collection, analysis and reporting. The data collected from routers, switches, servers, firewalls, workstations, operating systems and network services. Potential weaknesses are checked by destructive testing and made recommendations to correct security problems. There is a reporting system is available with the scanner that the information presented to employees of the company results.
Syslog ServerMessaging
Cisco IOS is a Unix program called syslog, which on a variety of devices and activities, reports error conditions. Most of the routers and switches generate syslog messages that are sent to a particular Unix workstation for review. If the console network management (NMS) is with the Windows platform, there are utilities that can be viewed from the log files and sending files between Unix syslog and Windows-NMS.
Copyright 2006 All rights reserved Shaun Hummel
free design software USB Storage android market
Continuar leyendo 
Ocultar articulo 