Showing posts with label Network Security Assessment. Show all posts
Showing posts with label Network Security Assessment. Show all posts

Tuesday, February 17, 2015

Five Perimeters to Define Enterprise Security Model?


There are five important perimeters to define enterprise security model and they are as follows:
  • Security policy
  • Perimeter
  • Network
  • Transaction
  • Monitoring security

assessment of a network security

Here are the detailed discussions on these very important security perimeters which are considered during network security assessments and creation of security architecture.

Security Policy Document


The security policy document is one of the most important security documents that describe various security policies for all employees that will use the enterprise network. This policy document also includes policies for non-employees including consultants, clients, and business partners and terminated employees, including security policies defined for the e-mail and virus detection. Moreover, it is the document which defines the cyclic structure of all types of security policies recommended for an enterprise.

Perimeter Security


This security perimeter defines all those security procedures which external users must pass before authenticating to the network. It is defined as security for the traffic which is linked to an external network (source and destination). Different components are utilized in perimeter security while during the security assessment all components are reviewed to ensure security – typical perimeter devices are external routers, RADIUS servers, firewalls, VPN concentrators and dial servers.

Network Security


Network security defines all the server and legacy host security that is implemented on the network for authenticating and authorizing internally and all other external employees. After verifying an author using perimeter security it is one such security which must be dealt in order to get access to start applications. The purpose of a network is to carry traffic between workstations and network applications (which are implemented on a shared server that may be using an operating system of UNIX or Windows). The operating system is responsible for storing data, respond to queries and maintain data security. Once a user is authenticated to a Windows ADS domain (against specific user account), it given privileges to access granted applications and other rights on the system.

Transaction Security


Transaction security has a dynamic perspective in network security architecture as it has to secure each session with the help of five important primary activities such as
  • Non-repudiation
  • Integrity
  • Confidentiality
  • Authentication
  • Virus detection

The real purpose of transaction security is to ensure data is secure before it is being transported across the internet or within the enterprise. This is particularly important for data on the internet as it is more vulnerable to those who will use it without permissions. E-commerce employs mostly used, some industry acknowledged standard such as SSL or SET (a set of protocols used for integration, authentication, and confidentiality). A well-managed security is what everyone needs to provide a virus free transaction security by examining data files for viruses even before they are transported to an internal user and later affect the whole network.

Monitoring Security


Monitoring network traffic for different security risks, vulnerabilities, and unusual events is crucial to any security strategy. This strategy is used to identify what type of practices and strategies will be used in order to secure the whole network from various vulnerabilities – this may include different monitoring solutions such as intrusion detection sensors and monitoring real-time traffic as it will arrive at your perimeter.

Friday, December 26, 2014

How NetworkSecurity can Change your Business Perspective?

Network security is becoming crucial part of IT security and it is playing a major role in reducing vulnerabilities of a system and helping companies to increase their potential. Here are some very important moves that are taken during network security assessment.

Security Policy Document


The important part of security assessment policy is that it must be documented well and one of the important parts is considered as security policy document for every organization. The security policy document describes almost every policy which is implemented in an enterprise network. It describes the duties of an employee and what they can do with the resources. The policy document also includes non-employees such as consultants, clients, business partners and even terminated employees. Moreover, these security policies are defined for internet e-mail and virus detection. It also covers complete cyclical processes to further assess the security system.

Perimeter Security


The second phase of this assessment is performing perimeter security; it explains a first line of defense that external users must deal with before authenticating to the network. It is a security for traffic whose destination is an external network. There are several components that are used to secure the perimeter of a network. During the process of assessment, all perimeter devices are utilized such as firewalls, TACACS servers, dial servers, external routers, modems and VPN concentrators.

Network Security


Network security assessment, a vital part of security assessment in which all of the servers and legacy host security are assessed. A security process implemented for authorizing and authenticating internal and external employees. In perimeter security, when a user is authenticated through perimeter security, it is that security that should be dealt with before starting any applications. The network carries traffic between workstations and network applications (while network applications are implemented on a shared server that could be running on different operating systems such as Mainframe MVS or UNIX).

Here are some important features of network that can be distributed as:

network security assessment
  • Non-Repudiation /RSA Digital Signatures
  • MD5 Route Authentication and integrity
  • Authentication along with Digital Certificates
  • Confidentiality holding IPSec/IKE/3DES
  • Virus Detection using antiviruses and continuous monitoring of security

Transaction Security


Transaction security works in a dynamic domain of functionality and cover five primary activities to boost network security. These five elements are
  • Non-repudiation
  • Authentication
  • Integrity
  • Confidentiality
  • Virus detection

Transaction security ensures that session data is protected before being transported across the enterprise communication channel or on the internet. This is important when dealing with the internet channel since data becomes vulnerable to those that would use the important information without permission. E-commerce employs some industry standards such as SSL and SET which describe a set of protocols that provide non-repudiation and CIA (confidentiality, integrity and authentication). Network security must be kept as the top preference because it is the only way to keep the security system healthy and defensible.