Security Administrator Handbook

Read Complete Research Material



Security Administrator Handbook

Security Administrator Handbook

Six basic concepts and Procedures to understand

Network Architecture and Security Considerations

In today's widespread use of networked information technologies and the need to work with the distributed information resources of the successful work of organizations depends on the safety and security of their computer networks. Basic objects (values) that are to be protected in the computer networks of organizations are

Intellectual property

Available computer resources

Confidential internal information

Important information about partners or "third parties" (customers, licensed software).

The known fact is that the majority of organizations are starting to think about the security of their networks, only after there is an intrusion into their network. Accordingly, consideration of the security of computer networks should occur early in the network. 

The main components of the strategy include the construction of secure networks

Network security at the network architecture, network protocols and equipment

The use of certified technology and network administration

The use of qualified and / or safety recommendations for system configuration and network management services

Defining a policy network security in its inception.

 

Wireless Security

A wireless network is based on a cellular architecture where each cell called BSS (Basic Service Set) is controlled by an AP (Access Point) or access point, forming a network called ESS (Extended Service Set). To obtain a satisfactory level of security on a wireless network, it is necessary to know the vulnerabilities inherent in this type of network:

dissemination of information to facilitate the interception passive remote;

the interference sensitivity decreasing the availability of the network;

The insecure default configurations of the new equipment, facilitating attacks.

Beyond training and user awareness, it is necessary to configure the network securely. This step involves configuring different protocol layers but also the periodic audit and continuous monitoring of the network. Despite the security issues are intrinsic to wireless networks and will probably continue to grow. It is therefore important to understand the problems associated with the implementation of such networks in order to mitigate its adverse effects. It is also important to determine the level of security required to implement a solution in line with this choice. Despite some perspective on the IEEE 802.11i standard, it is doomed to establish itself as the standard unifying security. Today, with the hindsight of the IEEE 802.11i standard, using IPSEC is the safest way to secure your wireless network, which does not prohibit implement encryption available radio link.

Remote Access Security

Today, there are various technologies to provide secure remote access, such as IPsec or SSL. However, the security threats to the already long known in the local network, are caused by the fact that the IT department is not always able to get the degree of control over remote system. Indeed, when the computer is in the office, you can with a high degree of certainty that it installed the necessary anti-virus software that has access to it only certain people, etc. When it comes to remote devices, something is difficult to guarantee. Until recently, the IT staff had to rely on security issues in their mobile workers, but often they just do not have the knowledge or skills to protect your ...
Related Ads