Requires Free Membership to View
Risks:
=====
Risks are threats to your objectives. A proper risk analysis should be done before making any technology decision.
Risk assessment should address the following:
What is at risk?
What is its value?
What are the threats?
What is the probability of occurrence?
Some of the common security risks are as follows:
--------------------------------------------------------------------------
Single point of failure
Loose security policies
Support protection
Limitation of technology
False sense of security
Weak encryption
Latency
Here are some firewall/VPN standards to consider:
======================================
Open architecture
Packet filteration
Default to denial
Auditing capabilities
Access control
Logging capabilities
Intrusion detection
Extended user authentication
Secured subnets
Strong encryption
Network management systems
Secure back-up
Statefull inspection
Real-time traffic monitoring and alerting system
Device management
Secure tunneling
Application layer traffic inspection
This was first published in February 2002
Network Management Strategies for the CIO

Join the conversationComment
Share
Comments
Results
Contribute to the conversation