Designing a Tough Network Security System
An organization may have two or more than one site or where each site has its own network. If the organization is large, it is highly possible that these sites have network administration differentiated according to the specific purpose.
If these sites are not connected via the internet, each site may have its own security policy. However, if these sites are connected via the Internet, then the security policy should include the purpose of all interconnected sites. For more information you can visit Outdoor Digital Signage.
Generally a site is part of an organization that has multiple computers and resources connected to a network. These resources for example;
- Workstation and Laptop
- Computer as host or server
- Interconnection: gateway, router, bridge, repeater
- Application and network software (NOS)
- Network cables
- Information inside files and databases
Site security policies should also take note of the security of these resources. Since the site is connected to other networks, the security policy should pay attention to the needs of all connected networks. This is important to note because it is possible that the site’s security policy can protect the site, but is harmful to other network resources.
An example of this is the use of an IP address behind a firewall, where the IP address is already used by someone else. In this case, intrusions can be made against the network behind the firewall by doing IP spoofing. For the record, RFC 1244 discusses the security of the site’s security in detail.
Network Security Policy
The security policy provides the framework for making specific decisions, such as what mechanisms will be used to protect the network and how to configure services. The security policy is also the basis for developing safe programming instructions for users to follow as well as for system administrators. Because the security virtue covers a very wide range, then at this time will only be discussed the core issues only and will not discuss the things that are specific in terms of technology.