Академический Документы
Профессиональный Документы
Культура Документы
Threat is everywhere
SECURITY MEASURES AND PROCEDURES AT FIVE DIFFERENT LEVELS WITHIN YOUR IT ENVIRONMENT
ALSO KNOWN AS DEFENCE IN DEPTH
Perimeter Level
Perimeter is the first line of defense from outside,
un-trusted networks
First and last point of contact for security defences
Internet begins
E.g. Makemytrip.com server hack revenue loss
Intelligent Quotient System Pvt. Ltd.
Perimeter Level
Firewall Network-based anti-virus
VPN encryption
Network Level
Internal LAN and WAN May include desktops and servers
Network Level
Intrusion detection /prevention system (IDS/IPS) Vulnerability management system
Host Level
Individual devices on the network, such as servers, desktops,
a single device
Intelligent Quotient System Pvt. Ltd.
Host Level
Hardware Component OS Security Host IDS Host vulnerability assessment (VA) Network access control
Anti-virus
Access control/user authentication
Application Level
Poorly protected applications can provide easy access
to confidential data and records Hard truth - most programmers dont code with security in mind
Application Level
Application shield Access control/user authentication
Input validation
Data Level
Blend of policy and encryption Access control/user authentication