dcsimg

Network security: Multiple layers of protection (page 1 of 2)

  • Sunday, August 16 - 2009 at 10:04

Today, network security can seem to the uninitiated like an unfathomable sprawl of arcane techniques and technologies. Vendors bandy around terms like authentication, encryption, firewalling, intrusion prevention, network behavioural analysis and a host of others with little thought for the customer. Most companies want to know they are investing in an appropriate level of defence for their systems without spending over the odds on ineffective, unnecessary or overly burdensome solutions.

By Jim Mortleman

Truth is, network security seems like a sprawl because that's what many company networks have become - a sprawl of different systems and devices that talk to one another in many different ways: across fixed local area networks (LANs), wireless and cellular networks, private wide-area networks (WANs), the fixed telephone network and the internet.

The only effective way to think about security in this nebulous world is in terms of 'layers' of protection.

Simon Young, general manager for server security EMEA at Trend Micro, says: "Security professionals, and indeed most business executives, fundamentally accept it takes multiple layers of defence to protect against the wide variety of attacks and threats.

'A single product or technique simply cannot protect against every possible threat. A layered approach gives an enterprise multiple lines of defence that will allow one product to catch things that may have slipped past the outer defences."

At the basic level, network security involves authenticating users, either using the familiar username/password combination, some form of physical authentication such as a card, USB key or biometric (fingerprint, retina scan, etc), or some combination of these approaches (appropriate for access to more sensitive parts of the network).

The next layer is the firewall, which governs the services authenticated users and applications are allowed to access. This can be based in on either the systems like PCs and servers at the edge of the network or on physical network hardware devices like routers and switches.

Beyond the firewall, intrusion prevention and detection systems then monitor networks for the presence or malware or suspicious behaviour, preventing particular types of activity according to rules and policies defined by the network administrator.

But again, these are by no means foolproof, and the difficulty of distinguishing between what's legitimate and what's not invariably means some level of additional human input.

Securing sensitive data


There's no doubt all businesses need to have adequate network security in place - not doing so is akin to an open invitation to hackers and criminals - but just as with the physical security of property, your network will only ever be as secure as the weakest point of entry.

Not only that, but the aforementioned sprawl also means there will almost undoubtedly be several doors with dodgy locks, windows that can be smashed, and dusty, hidden ventilation shafts that could lead straight to the room containing your top-secret filing cabinets.

And that's not to mention the fact that hackers also use clever social engineering techniques to gain access to physical buildings or persuade users to part with logins.

As a consequence of the inherent insecurity of networks, many believe it's far more important to concentrate most efforts on securing sensitive data.

Clive Longbottom, a senior analyst at Quocirca, says: "Make sure your data is impermeable - at rest, on the move, wherever it may be. It should be encrypted, with certificates around it. For example, if somebody's got it on their laptop and they don't touch the network for whatever you deem a suitable period, it should automatically delete itself. That's the approach I'd recommend."

Remote security management: Do cost savings outweigh concerns?


Many businesses are reluctant to offload something seen as critical as managing the security of their network to a third party, particularly one that may be located far from the apparent (though often illusory) security of their own premises.
Article Options

Disclaimer »

Articles in this section are primarily provided directly by the companies appearing or PR agencies which are solely responsible for the content. The companies concerned may use the above content on their respective web sites provided they link back to http://www.ameinfo.com

Any opinions, advice, statements, offers or other information expressed in this section of the AMEinfo.com Web site are those of the authors and do not necessarily reflect the views of AME Info FZ LLC / 4C. AME Info FZ LLC / 4C is not responsible or liable for the content, accuracy or reliability of any material, advice, opinion or statement in this section of the AMEinfo.com Web site.

For details about submitting your stories, please read the guide - all content published is subject to our terms and conditions