Monday, June 29, 2020

Network Security Management Architecture

To ensure the security of enterprise information resources, information protection tools are usually located directly on the corporate network. MEs control access to corporate resources, reflecting attacks from outsiders, and virtual private network gateways (VPNs) provide confidential information transfer through open global networks, in particular the Internet. To create reliable defense in depth, security tools such as Intrusion Detection Systems (IDS), access controls for information content, anti-virus systems, etc. are also currently used.

Most CISs are built on the basis of software and hardware supplied by various manufacturers.

Each of these tools requires careful and specific configuration, reflecting the relationship between users and the resources available to them. In order to ensure reliable information protection in heterogeneous CIS, a rationally organized CIS security management system is needed that would ensure the security and proper configuration of each CIS component, constantly monitor the changes that occur, install “patches” on the gaps found in the system, and monitor the user’s work. Obviously, the more heterogeneous IS, the more difficult it is to manage its security architect job description.

Network Security Threat Analysis
A set of TCP / IP protocols is used to organize communications in a heterogeneous network environment, ensuring compatibility between computers of different types. Compatibility is one of the main advantages of TCP / IP, so most computer networks support these protocols. In addition, TCP / IP ...
(Information security of computer systems and networks)
NETWORK SECURITY MANAGEMENT
The information security system should protect the network’s information resources from the most common external and internal attacks aimed at disabling servers and destroying data, from unwanted penetration into local area networks through “holes” in the OS, from targeted ...
(Information security of computer systems and networks)
NETWORK SECURITY MANAGEMENT METHODS
The most important component of the corporate network management system is the information security system. This system should: • centrally and efficiently carry out control actions on network security facilities; • conduct regular audits and monitoring that provide objective information ...
(Information security of computer systems and networks)
Network Security Management Tasks
We formulate the main tasks of managing an enterprise-wide network security system. Functionally, the information security management system in a distributed enterprise-wide network should solve the following tasks: • managing a global security policy (GBS) within the network ...
(Information security of computer systems and networks)
NETWORK SECURITY
Most modern networks use the TCP / IP protocol stack in their work , therefore, speaking of network security, we will keep in mind the security of just such networks. By network security threats we mean not only threats to the security of computer networks themselves, but also security threats ...
(Information management)
The architecture of the information security system (SOIB) EMTSSS
The overall management of the information security work of the EMCSS is assigned to the Information Security Directorate of the Corporate Policy Department of Russian Railways OJSC (hereinafter referred to as the Information Security Directorate). For the direct organization of work to ensure information ...
(Information security and information protection in railway transport Part 1: Methodology and system for ensuring information security in railway transport)
Network Security Threat Analysis
A fundamental factor in the effective operation of any corporate information system is the provision of enterprise document management through secure network communications. Threats and vulnerabilities of corporate networks and systems. Currently, in the face of an ever-increasing number of attacks, ...
(Electronic document management and security using standard windows tools)
Network Shielding and Network Security Policy
An effective mechanism for ensuring information security in computer networks is shielding, which performs the function of delimiting information flows at the boundary of the protected network, i.e. filtering according to certain criteria. Firewall (Fig. 6.1) increases security ...
(Electronic document management and security using standard windows tools)

No comments:

Post a Comment