1
Prepared by Richard Chalamila 1. Several types of security management strategies and defenses and its uses to ensure the security of business applications of information technology. i. Place encryption throughout network to ensure privacy Encryption is a process of converting message or digital data from plain text which any people can understand to the cipher text by using special mathematical algorithms, or keys. This encryption is necessary to be used when the computers is within the network especially in the internet, extranet and intranet to protect the transmission of messages, files and passwords. ii. Use firewall technology for fine-grained security Firewalls a part of computer system or network which is designed to block unauthorized access while permitting outward communication. This firewalls it act like a gate by providing a password or other security code and it filter all traffic inward or outward from the computer so it prevent the computer from the intrusion of viruses and other harmfully hazard. iii. Authenticate and authorize all network users Authentication should be handled at the earliest point of connection of the system to the network: even before the client is assigned a network address. This combination of authentication and authorization should form the basis of security policy. Example of authorization is providing Login form by Password. iv. Detect threats to the integrity of the network and remediate them Integrity is to ensure that the data must be protected from unauthorized, unanticipated, or unintentional modification. Examples: Census information, economic indicators, or financial transactions systems. v. Include End-Point Security in Policy Enforcement A user who successfully identifies to the network should be given different privileges depending on the system they are using for access. Most network managers are already aware of the problem of end-point security and have tools such as anti-virus, personal firewall, and patch management in place on many systems.

Security Management Strategies and Defense and their uses

Embed Size (px)

Citation preview

Page 1: Security Management Strategies and Defense and their uses

Prepared by Richard Chalamila

1. Several types of security management strategies and defenses and its uses to ensure

the security of business applications of information technology.

i. Place encryption throughout network to ensure privacy – Encryption is a process of

converting message or digital data from plain text which any people can understand to

the cipher text by using special mathematical algorithms, or keys.

This encryption is necessary to be used when the computers is within the network

especially in the internet, extranet and intranet to protect the transmission of messages,

files and passwords.

ii. Use firewall technology for fine-grained security –Firewalls a part of computer system

or network which is designed to block unauthorized access while permitting outward

communication.

This firewalls it act like a gate by providing a password or other security code and it

filter all traffic inward or outward from the computer so it prevent the computer from the

intrusion of viruses and other harmfully hazard.

iii. Authenticate and authorize all network users – Authentication should be handled at

the earliest point of connection of the system to the network: even before the client is

assigned a network address. This combination of authentication and authorization should

form the basis of security policy. Example of authorization is providing Login form by

Password.

iv. Detect threats to the integrity of the network and remediate them –Integrity is to

ensure that the data must be protected from unauthorized, unanticipated, or unintentional

modification. Examples: Census information, economic indicators, or financial

transactions systems.

v. Include End-Point Security in Policy Enforcement – A user who successfully

identifies to the network should be given different privileges depending on the system

they are using for access. Most network managers are already aware of the problem of

end-point security and have tools such as anti-virus, personal firewall, and patch

management in place on many systems.