Teleworker Security Design

This chapter covers the following topics:

  • Defining the Teleworker Environment
  • Expected Threats
  • Threat Mitigation
  • Identity Considerations
  • Network Design Considerations
  • Software-Based Teleworker Design
  • Hardware-Based Teleworker Design
  • Design Evaluations

We find that there are approximately 28 million Americans who are teleworkers that work at home, at a telework center or satellite office, work on the road, or some combination of these.

International Telework Association and Council, 2001 Telework America Summary

Work expands so as to fill the time available for its completion.

C. Northcote Parkinson, Parkinson's Law, 1957

Teleworker security continues to be a difficult problem for many organizations. Toward the end of the 1990s, it was still most common for teleworkers to access their organization's network over dial-up lines or private Integrated Services Digital Network (ISDN) connections. Today, many organizations are pressed to offer their users broadband connectivity or other Internet-accessible connection options. By using the IP network as a means of transporting teleworker traffic, the edge of your IP network is extended to include the teleworker systems, wherever they may be. Your organization's security is impacted not just by the security of the systems remotely accessing your network but also by the security of the location from which that access originates. This chapter presents teleworker secure network designs in the same format as done for the edge and campus networks in the previous two chapters.

Part I. Network Security Foundations

Network Security Axioms

Security Policy and Operations Life Cycle

Secure Networking Threats

Network Security Technologies

Part II. Designing Secure Networks

Device Hardening

General Design Considerations

Network Security Platform Options and Best Deployment Practices

Common Application Design Considerations

Identity Design Considerations

IPsec VPN Design Considerations

Supporting-Technology Design Considerations

Designing Your Security System

Part III. Secure Network Designs

Edge Security Design

Campus Security Design

Teleworker Security Design

Part IV. Network Management, Case Studies, and Conclusions

Secure Network Management and Network Security Management

Case Studies

Conclusions

References

Appendix A. Glossary of Terms

Appendix B. Answers to Applied Knowledge Questions

Appendix C. Sample Security Policies

INFOSEC Acceptable Use Policy

Password Policy

Guidelines on Antivirus Process

Index



Network Security Architectures
Network Security Architectures
ISBN: 158705115X
EAN: 2147483647
Year: 2006
Pages: 249
Authors: Sean Convery

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net