E-Book, Englisch, Band 32, 244 Seiten, eBook
Frye Network Security Policies and Procedures
1. Auflage 2007
ISBN: 978-0-387-47955-2
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
E-Book, Englisch, Band 32, 244 Seiten, eBook
Reihe: Advances in Information Security
ISBN: 978-0-387-47955-2
Verlag: Springer US
Format: PDF
Kopierschutz: 1 - PDF Watermark
Company network administrators are compelled today to aggressively pursue a robust network security regime. Network Security Policies and Procedures gives the reader a strong, multi-disciplinary understanding of how to pursue this goal.
This professional volume introduces the technical issues surrounding security as well as how security policies are formulated at the executive level and communicated throughout the organization. Readers will gain a better understanding of how their colleagues on "the other side of the fence" view an organization’s security and will thus be better equipped to act in a way that forwards an organization’s goals.
Network Security Policies and Procedures is intended for both technical and management professionals interested in learning how security manifests itself throughout all levels of an organization. This book is also suitable for advanced-level students in computer science and electrical engineering.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Information Technology and Its Role in the Modern Organization.- The Extent of an Organization’s Connectivity.- Network Physical Components.- Legitimate Network Access.- Illegitimate Network Access.- Encryption.- Balanced Scorecard.- Sarbanes-Oxley.- Physical Security.- Disaster Recovery.- Initial Employee Communication.- The Human Element.- Email, Instant Messaging and Phishing.- Network Administration.- Network Monitoring.- Executive Communication.- Information Security Awareness.- Synthesis and Conclusion.- Draft Policies.
Chapter 3 Network Physical Components (p. 27-28)
Chapter 3 Objective
This chapter will discuss the various physical components of an organization's network.
3.1 Introduction
In a modern organization there will be a significant IT posture, relative to the size of the operation. While modem connectivity has improved an organization's ability to operate in an extended enterprise spanning all comers of the world, as discussed in Chapter 2, it has also put them at risk for theft, fraud, data loss and hacking, as the examples from Chapter 1 established. To provide the background for the communication, policy and enterprise architecture discussions to follow in later chapters, the next few chapters will discuss the various physical and software-based elements of an organization's IT environment. Chapters 14 and 15 cover network administration and monitoring. As the emphasis of this book is on the policies facilitating a well-stmctured enterprise, the directly technical aspects of the issues are covered in sufficient depth to provide the reader with an overview of the subject matter.
3.2 Computers
3.2.1 Desktops and Laptops
Virtually everyone with an office job uses a computer for at least parts of their job, even if it is only as a typewriter substitute. The desktop computer (Figure 3.1) is the most common piece of hardware used to perform work and to access the Intemet, while the laptop (Figure 3.2) is the choice of consultants, especially those who travel and must work on airplanes, in hotel rooms and on cafe tables, often with one or more colleagues sharing the space. Desktops are the more powerful of the two systems, but laptops now have capabilities sufficient to perform all routine work and at the high end have the ability to perform complex and resource-intensive functions such as economic analysis.