Saturday, April 6, 2013

Chapter 11 - Network Assessment


The threat of an outsider accessing an organization’s network via the internet and then stealing or destroying data is a real possibility today. Before spending any money or time on network security you should examine the network’s security risks. An organization should conduct a posture assessment which is a thorough examination of each aspect of the network to determine how it might be compromised. A security audit asses the security of your network.
Security risks come from all types of vulnerability weaknesses. When these weaknesses are taken advantage of it is known as exploiting. The following areas are of real concern:
  • Risks Associated with People
  • Risks Associated with Transmission and Hardware
  • Risks Associated with Protocols and Software
  • Risks Associated with Internet Access

 In an effort to help mitigate these risks an effective security policy goes a long way. It begins with identifying your security goals, risks, levels of authority, designated security coordinator, and team members’ responsibilities for each team member as well as responsibilities for each employee. It encompasses the following areas:
  •  Security Policy Goals
  • Security Policy Content
  • Response Policy

 The chapter goes into myriad of topics discussing the various types of Physical Security, Security in Network Design, Network Operating System Security, Authentication Protocols, and Wireless Network Security. Each one these areas are delved into with much detail.

I found this chapter to be very helpful in reviewing some previous learned topics. It was presented in an organized and informative manner

No comments:

Post a Comment