Unified Security Architecture for enterprise network security

ثبت نشده
چکیده

to threats from within and outside the organization. The new openness of networked communications introduces new ethical, financial, and regulatory pressures to protect networks and enterprises from internal and external threats and attacks. Every IT security professional should be up-to-date on the Top Ten challenges to enterprise security—and the latest recommendations to address those challenges. A conceptual, physical, and procedural framework for high-performance, multi-level, multi-faceted security to protect campus networks, data centers, branch networking, remote access, and IP telephony services. Today's connected enterprise faces a security paradox. The very openness and ubiquity that make the Internet such a powerful business tool also make it a tremendous liability. The Internet was designed to share, not to protect. The ports and portals that welcome remote sites, mobile users, customers, and business partners into the trusted internal network also potentially welcome cyber-thieves, hackers, and others who would misappropriate network resources for personal gain. The only effective network security strategy is one that permeates the end-to-end architecture and enforces corporate policies on multiple levels and multiple network points. Nortel Networks, a global leader in secure data networking, offers proven solutions to satisfy end-to-end network security requirements. " Security in the DNA " is a key tenet of our strategy for the new enterprise network, a convergence framework we call " One Network. A World of Choice. " This document presents the security component of that enterprise network strategy. The " Unified Security Architecture " provides a conceptual, physical, and procedural framework of best recommendations and solutions for enterprise network security. It serves as an important reference guide for IT professionals responsible for designing and implementing secure networks. What are the requirements and vulnerabilities? What technology options and implementation choices are available? How do you protect the network at all levels? This comprehensive strategy addresses those pressing concerns facing IT security specialists, and offers encouraging news about the depth and breadth of options available for securing critical network resources. The Unified Security Architecture is realistic. It assumes that all components of an IT infrastructure are targets... that even internal users could be network threats... attacks are inevitable... network performance cannot be compromised by processing-intensive security measures... and IT budgets are constrained. The Unified Security Architecture acknowledges the diversity of networked enterprises. It is not a one-size-fits-all prescription, but rather a framework of functionality that offers multiple implementation choices suitable for closed, extended, and open enterprises …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Enterprise Architecture Framework to Design Network Security Architecture

-In the recent years, Information Technology (IT) has come to play an important, and often vital, role in almost all aspects of the life and so there is a growing role and importance for the enterprise architecture (EA) in the management of the organizations. Network security architecture, which can be referred as a comprehensive description of all of the key elements and relationships that mak...

متن کامل

Bringing Security Proactively Into the Enterprise

Prevailing network architectures are designed for openness, collaboration, and sharing. The majority of viruses and worms use the network to spread rapidly through the enterprise network, enabling these cyber threats to reach their targets effortlessly. The most common solution available today for cyber security is hardening of systems via “patching” or keeping the operating systems, applicatio...

متن کامل

Enterprise Security Architecture

The emergence of internetworked systems enables corporations and government agencies to share information in an unprecedented fashion. The sharing of information expands the traditional enterprise boundary to even include dynamically established virtual enterprises. The internetworking of systems introduces significant security challenges and requirements for a new enterprise security assessmen...

متن کامل

Modeling Authorization in Enterprise-wide Contexts

Authorization and its enforcement, access control, has stood at the beginning of the art and science of information security, and remains being a crucial pillar of secure operation of IT. Dozens of different models of access control have been proposed. Although enterprise architecture as a discipline strives to support the management of IT, support for modeling authorization in enterprises is l...

متن کامل

Mobile WiMAX Security, Architecture and Assessment

WiMAX (Worldwide Interoperability for Microwave Access) is an emerging wireless communication system that can provide broadband access with large-scale coverage. Since 2001, WiMAX has evolved from 802.16 to 802.16d standard for fixed wireless access and to the new IEEE 802.16e (Mobile WiMAX) standard with mobility support. The importance of IEEE-Standard 802.16 WiMAX is growing and will compete...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002