Designing Your Security System

This chapter covers the following topics:

  • Network Design Refresher
  • Security System Concepts
  • Impact of Network Security on the Entire Design
  • Ten Steps to Designing Your Security System

The Park [Central Park, New York City] throughout is a single work of art, and as such subject to the primary law of every work of art, namely, that it shall be framed upon a single, noble motive, to which the design of all its parts, in some more or less subtle way, shall be confluent and helpful.

Calvert Vaux, report submitted with Greensward Plan, awarded first prize by the Board of Commissioners of the Central Park, 1858

Good Design keeps the user happy.

Raymond Loewy, industrial designer, recalled on his death July 14, 1986

Now it is time to take all of the information you've learned so far and apply it to your own organization. This chapter outlines the overall process of designing your security system, from the initial network all the way through evaluating the result. This chapter draws heavily on everything you have read thus far and acts as a bridge to the remaining portion of the book, which focuses on sample designs for different-sized networks. The beginning of the chapter provides a brief summary of basic network design conventions and then maps them into the security world. The middle of the chapter provides the 10 major steps in designing your security system. The last part of the chapter outlines methods of evaluating the success of your security system, relating back to portions of the security life cycle from Figure 2-1.

Part I. Network Security Foundations

Network Security Axioms

Security Policy and Operations Life Cycle

Secure Networking Threats

Network Security Technologies

Part II. Designing Secure Networks

Device Hardening

General Design Considerations

Network Security Platform Options and Best Deployment Practices

Common Application Design Considerations

Identity Design Considerations

IPsec VPN Design Considerations

Supporting-Technology Design Considerations

Designing Your Security System

Part III. Secure Network Designs

Edge Security Design

Campus Security Design

Teleworker Security Design

Part IV. Network Management, Case Studies, and Conclusions

Secure Network Management and Network Security Management

Case Studies

Conclusions

References

Appendix A. Glossary of Terms

Appendix B. Answers to Applied Knowledge Questions

Appendix C. Sample Security Policies

INFOSEC Acceptable Use Policy

Password Policy

Guidelines on Antivirus Process

Index



Network Security Architectures
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors: Sean Convery

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net