Chapter 2: The Security Review Process


2.1 Introduction

It is 1860, and you are the bank manager. Your number-one goal is to keep the money safe. What steps will you take to keep the money from the men in the black hats? Some of these steps may be to understand how the bank will be robbed:

  • Will the robbers enter by the front door?

  • Will they enter by the back door?

  • Will they try to use explosives on the safe?

  • Will they use "social engineering" to get the money? "Joe sent me down to get his money. Give it to me and I will give it to him in the bar."

  • Will they try to use someone on the inside to help get the money?

Next, the manager will determine what steps are needed to keep the bad guys out:

  • Use a safe with a combination lock.

  • Put bars on the door.

  • Get a security guard Hire a gun slinger.

  • Keep a gun and use it if needed.

  • Train employees how to keep the money safe.

  • And, most important, make sure that the bank manager knows the sheriff.

You will need to take similar action as the owner and/or manager of your network infrastructure. Using the following five steps will get you started with your security review:

  1. Start by reviewing the current state of the business.

  2. Analyze the technology currently being used.

  3. Start a risk analysis process.

  4. Create the plans.

  5. Begin your security implementation process.

Each step will link into a succeeding step. This approach should be used for each process or department within the business, as well as for the holistic enterprise.

click to expand
Figure 2.1




Internet Security(c) A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers
ISBN: 1555582982
EAN: 2147483647
Year: 2003
Pages: 103
Authors: Tim Speed, Juanita Ellis
BUY ON AMAZON

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net