Assume that you are the network security officer of a company. What will be your plan to enhance your network security (firewall? VPN? Content level protection? Or combination of them?) More details about your security infrastructure design will be welcome.
Assume that you are the network security officer of one company, what will be your plan to enhance your network security (firewall? VPN? Content level protection? Or combination of them?) More details about your security infrastructure design will be welcome.
Security Management guides organization leaders and senior managers through issues that they should consider when developing an effective security policy and implementing it through a security program. (Microsoft). The future of security management is bright due to greater need of it due to emergence of new technologies such as ecommerce, wireless applications.
Following tools can be used;
Digital signatures provide information regarding the sender of an electronic document. The technology has assumed huge importance recently with the realization that it may be the remedy to one of the major barriers to growth of electronic commerce: fear of lack of security. Digital signatures provide data integrity, thereby allowing the data to remain in the same state in which it was transmitted. The identity of the sender can also be authenticated by third parties.
Digital certificate: It is an attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. (Webopedia)
They are issued by a certificate authority (CA) who is an external ...
This explains the steps to enhance network security: Firewall, VPN, Content level protection