Network security vendors will come out in force if they get word that you're contemplating such a project. Most security technologists responsible for leading a project of this nature tend to focus on individual components of a larger system that can be unwieldy. The rub comes when you have to rearchitect the network for security's sake. How does a company decide on an overall network security architecture? What if your company has been in business for 25 years, and the network sprawls across the country? It's not so hard to architect a secure network when you have plenty of money and are working with a clean slate. It appears that the most comparable information to Sun and Cisco's offerings, is a white paper called Best Practices for Enterprise Security. I really had to hunt around for a "blueprint". If you go to that page you are presented with a myriad of choices for IT professionals, developers, home users and business. NET Server 2003 will ship "secure by default." In seach of Microsoft security blueprints, I went directly to Microsoft's site and ran a search on "security." From the list of links I found that Microsoft has a Security & Privacy homepage. Microsoft purports to have made dramatic changes in how it writes its code and develops its programs, with the promise that Windows. Bill Gates, co-founder of Microsoft, issued an "executive e-mail" on July 18, 2002, calling upon the Internet community to work together to build a "Trustworthy Computing" ecosystem. Search engine results give very few links to Microsoft, however I did find a highly publicized account of their network being hacked two years ago. Cisco's blueprint program is called Safe Blueprint and includes detailed instructions for securing enterprise networks, small to midsize networks, remote user connections, VPNs, wireless LANs and IP telephony networks. Foremost on the list will be Sun Microsystems Inc., which provides detailed plans for securing the Solaris operating system and offers information on interesting subjects such as "how hackers do it."Ĭisco Systems Inc. If you go to and type in the words "security blueprints," you will find many vendor listings. Understanding what you need to protect is the first step in the process of defining your security architecture and documenting that with a blueprint or detailed plan. How many doors and windows are there? How are they secured? Who is allowed in and out of each opening? Must people in your home identify themselves in some way before going out and coming in? Do family members have a key to enter the home, or do they just turn the knob? Do you have possessions that you are concerned about protecting? Do you have children or an elderly family member who needs protection? Do you leave the back door cracked open so the puppy can get in and out? Networks and employees need protection in the same way a home and family do. Think of network security architecture in the same way you think of your home's architecture. The firewall will do absolutely no good if security can be breached through a poorly configured virtual private network (VPN) connection or if you have a disgruntled employee who has access to critical information systems. Oftentimes, we focus on individual technologies such as a firewall or intrusion-detection system. When thinking in terms of a network security blueprint, one would think of the overall architecture first and then the individual components of the system. Van Wyden earned her Bachelor of Arts in journalism from New Mexico State University in 2006.A blueprint is a detailed plan or program of action. She has worked as a CPS social worker, gaining experience in the mental-health system. She has written for “Tu Revista Latina” and owns three blogs. Genevieve Van Wyden began writing in 2007. TutsPlus: 7 Tips on What Information to Put on Your Business Card.Design Shack: What to Put on a Business Card: 8 Creative Ideas.Vistaprint: What Information Should You Include on Your Business Card?.How to Make a Rough Draft for Advertising
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |