Tuesday, February 17, 2015

Five Perimeters to Define Enterprise Security Model?


There are five important perimeters to define enterprise security model and they are as follows:
  • Security policy
  • Perimeter
  • Network
  • Transaction
  • Monitoring security

assessment of a network security

Here are the detailed discussions on these very important security perimeters which are considered during network security assessments and creation of security architecture.

Security Policy Document


The security policy document is one of the most important security documents that describe various security policies for all employees that will use the enterprise network. This policy document also includes policies for non-employees including consultants, clients, and business partners and terminated employees, including security policies defined for the e-mail and virus detection. Moreover, it is the document which defines the cyclic structure of all types of security policies recommended for an enterprise.

Perimeter Security


This security perimeter defines all those security procedures which external users must pass before authenticating to the network. It is defined as security for the traffic which is linked to an external network (source and destination). Different components are utilized in perimeter security while during the security assessment all components are reviewed to ensure security – typical perimeter devices are external routers, RADIUS servers, firewalls, VPN concentrators and dial servers.

Network Security


Network security defines all the server and legacy host security that is implemented on the network for authenticating and authorizing internally and all other external employees. After verifying an author using perimeter security it is one such security which must be dealt in order to get access to start applications. The purpose of a network is to carry traffic between workstations and network applications (which are implemented on a shared server that may be using an operating system of UNIX or Windows). The operating system is responsible for storing data, respond to queries and maintain data security. Once a user is authenticated to a Windows ADS domain (against specific user account), it given privileges to access granted applications and other rights on the system.

Transaction Security


Transaction security has a dynamic perspective in network security architecture as it has to secure each session with the help of five important primary activities such as
  • Non-repudiation
  • Integrity
  • Confidentiality
  • Authentication
  • Virus detection

The real purpose of transaction security is to ensure data is secure before it is being transported across the internet or within the enterprise. This is particularly important for data on the internet as it is more vulnerable to those who will use it without permissions. E-commerce employs mostly used, some industry acknowledged standard such as SSL or SET (a set of protocols used for integration, authentication, and confidentiality). A well-managed security is what everyone needs to provide a virus free transaction security by examining data files for viruses even before they are transported to an internal user and later affect the whole network.

Monitoring Security


Monitoring network traffic for different security risks, vulnerabilities, and unusual events is crucial to any security strategy. This strategy is used to identify what type of practices and strategies will be used in order to secure the whole network from various vulnerabilities – this may include different monitoring solutions such as intrusion detection sensors and monitoring real-time traffic as it will arrive at your perimeter.

No comments:

Post a Comment