The threat of an outsider accessing an organization’s
network via the internet and then stealing or destroying data is a real possibility
today. Before spending any money or time on network security you should examine
the network’s security risks. An organization should conduct a posture assessment which is a thorough
examination of each aspect of the network to determine how it might be
compromised. A security audit asses
the security of your network.
Security risks come from all types of vulnerability
weaknesses. When these weaknesses are taken advantage of it is known as
exploiting. The following areas are of real concern:
- Risks Associated with People
- Risks Associated with Transmission and Hardware
- Risks Associated with Protocols and Software
- Risks Associated with Internet Access
In
an effort to help mitigate these risks an effective security policy goes a long
way. It begins with identifying your security goals, risks, levels of
authority, designated security coordinator, and team members’ responsibilities
for each team member as well as responsibilities for each employee. It
encompasses the following areas:
- Security Policy Goals
- Security Policy Content
- Response Policy
The
chapter goes into myriad of topics discussing the various types of Physical Security,
Security in Network Design, Network Operating System Security, Authentication
Protocols, and Wireless Network Security. Each one these areas are delved into
with much detail.
No comments:
Post a Comment