Bringing Security Proactively Into the Enterprise
نویسنده
چکیده
Prevailing network architectures are designed for openness, collaboration, and sharing. The majority of viruses and worms use the network to spread rapidly through the enterprise network, enabling these cyber threats to reach their targets effortlessly. The most common solution available today for cyber security is hardening of systems via “patching” or keeping the operating systems, applications, and anti-virus software current. This option is reactive and time/labor intensive because security updates are available only after exploits are known and already in use. The currency of software does nothing to prevent cyber attacks from reaching their targets. We believe that policy-enabled network security complemented by system hardening, provides a proactive and more comprehensive strategy to deal with security by reducing the likelihood of cyber threats entering the network and by controlling their spread. Typical enterprise network architectures are developed to bring scalability, extensibility, and availability to the Intranet. Security capabilities have not been part of the enterprise network architecture and are typically implemented in reactive fashion. Additionally, current security capabilities require manual and labor-intensive efforts that negatively impact costs and take time to implement. Firstly, we propose a change to the enterprise network architecture by integrating security components such as packet filtering, stateful inspection, port-based access control, and super/sub Virtual Local Area Networks (VLANs). Secondly, we propose a fundamental change in the implementation of the enterprise network architecture by using a security management system referred to as PolicyEnabled Network Security (PENS) that leverages the new security capabilities in an integrated and proactive manner and reduces unstructured manual, labor-intensive, and error-prone activities.
منابع مشابه
BYOD and the Mobile Enterprise - Organisational challenges and solutions to adopt BYOD
Bring Your Own Device, also known under the term BOYD refers to the trend in employees bringing their personal mobile devices into organisations to use as a primary device for their daily work activities. With the rapid development in computing technology in smartphones and tablet computers and innovations in mobile software and applications, mobile devices are becoming ever more powerful tools...
متن کاملProactive Exploratory Testing Methodology During Enterprise Application Modernization
Traditional web applications are getting modernized to meet the expectations of customer demands. Various features like channels, infrastructure enhancements, cloud and big data adoptions, business analytics are getting implemented. This leads to complexity of the target application and also leads to difficulty in meeting the desired SLA. A tester can proactively identify issues by performing e...
متن کاملOptimized Workflow Authorization in Service Oriented Architectures
Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic enterprise resource planning systems (ERP) are decomposed into Web services which are then again orchestrated in terms of Web service workflows, bringing about higher levels of flexibility and adaptability. In general, such servic...
متن کاملNational Institute of Standards and Technology Request for Information National Network for Manufacturing Innovation (nnmi)
This response to the RFI provides recommendations by the Smart Manufacturing Leadership Coalition (SMLC). The SMLC is a non-profit organization of manufacturers, manufacturing consortia, universities, and government laboratories and agencies committed to improving U.S. manufacturing competitiveness through the comprehensive adoption of Smart Manufacturing (SM) systems across entire manufacturin...
متن کاملExploring the Type of Relationship between Information Security Management and Organizational Culture (Case Study in TAM Iran Khodro Co.)
A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...
متن کامل