Chapter 21: Network Security Architecture

  

In This Chapter

Using networks as a security measure is a common practice to protect the organization at a network level of security that can be applied over and over again throughout the organization. The security level involves selected hardware, software, and internally developed programs to monitor and manipulate packets. Blocking packets that appear questionable can keep hackers at bay. However, various organizations that I have consulted for have come to the realization, over and over again, that the only guarantee to ensure that attackers will never enter an organization is to simply cut the network cable from the organization to the Internet. Some highly visible organizations have done that to ensure their privacy. However, not being connected to the Internet does limit an organization's effectiveness in doing business.

Even today, when many organizations are connected to the Internet, there is very little understanding of using network security to understand and block questionable packets. Some organizations have network engineers that truly understand TCP/IP at a network level, but very few can afford the expense of having developers who can develop customization to ensure a strong security image. Many organizations solve these issues through third-party software and hardware. However, inexperienced engineers who administrate the third-party devices incorrectly can limit the usefulness of these devices.

There have been many incidents when hundreds of thousands of dollars have been spent on third-party devices and a very minimally skilled person has set them up. Later it is discovered that some of the updates or security features were never turned on. It is just as important to have someone who truly understands networking develop the perimeters of an organization as it is to have quality equipment. A discussion of security is intrinsically coupled with networks and network security. This chapter introduces concepts of networking and network security to provide a basis for future chapters. It discusses the importance of protocols and how they manage security, the importance of the OSI model, and it includes a section on Java Sockets along with Java source code to aid in the understanding and implementation of the discussed concepts.

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net