- Enterprise Security Part-II
Network security is the term which consists of the provisions and policies adopted by a network administrator and the teams to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.
We can accomplish network security by using both hardware and software. The software must be constantly updated and managed to protect you from all new threats.
Many components are usually part of network security system. Ideally, all components work together, which minimizes maintenance and improves security.
Network security components often include:
- Anti-virus and anti-spyware
- Firewall, to block unauthorized access to your network
- Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks
- Virtual Private Networks (VPNs), to provide secure remote access
Network Security Threats
Many network security threats today are spread over the Internet. The most common one are:
- Viruses, worms, and Trojan horses
- Spyware and adware
- Zero-day attacks, also called zero-hour attacks
- Hacker attacks
- Denial of service attacks
- Data interception and theft
- Identity theft
Security Policies and security standards are one of the most important parts of the enterprise requirement management process. Security policies are established at executive level and have the characteristics like durability, resistant to impulsive change, and not technology specific. Many of today's existing enterprise security infrastructures are the result of an incremental and evolutionary process. As a consequence, they generally comprise a series of point solutions, upgrades, and add-ons that are not seamlessly integrated, creating gaps in their overall security effectiveness. Supporting and maintaining these security solutions requires significant amounts of dedicated staff time, and because of the unknown gaps in security, they are vulnerable to attacks that too often lead to expensive cleanup efforts and/or the theft of a business' private, personal, and confidential digital information.
The information assurance process typically begins with the enumeration and classification of the information assets to be protected. Next, the IA practitioner will perform a risk assessment for those assets. Vulnerabilities in the information assets are determined in order to enumerate the threats capable of exploiting the assets. The assessment then considers both the probability and impact of a threat exploiting vulnerability in an asset, with impact usually measured in terms of cost to the asset's stakeholders. The sum of the products of the threats' impact and the probability of their occurring is the total risk to the information asset.
Enterprise Security Management
ESM is an emerging market space within the security technology arena that consists of several vendors who provide a holistic view of all your security device information. This includes: consolidating, normalizing, correlating, monitoring, analyzing, reporting on and responding to those security events across multiple heterogeneous security products specifically within mid-size to large Organizations.
ESM provides the foundation to optimize the enterprise for its intended use, whether in warfare or day-to-day business operations. Providing comprehensive services to manage IA across the enterprise enables operators to tailor the enterprise for the full spectrum of its uses.
The Information Security Management (ISM) framework defines how we manage information security in alignment with the international information security management standard ISO/IEC 27001. Information security is critically important to both you and your customers.ISO/IEC 27001 is the only auditable international standard which defines the requirements for an Information Security Management System (ISMS). The standard is designed to ensure the selection of adequate and proportionate security controls.This helps you to protect your information assets and give confidence to any interested parties, especially your customers. The standard adopts a process approach for establishing, implementing, operating, monitoring, reviewing, maintaining, and improving your ISMS.