Ten steps to secure networking
Secure networking ensures that the network is available to perform its appointed task by protecting it from attacks originating inside and outside the organization.
Traditional thinking equates this to a handful of specific requirements, including user authentication, user device protection and point solutions. However, the move to convergence, together with greater workforce mobility, exposes networks to new vulnerabilities, as any connected user can potentially attack the network.
Application traffic must be securely delivered across the network, avoiding threats such as theft of intellectual property or private data. In addition, the underlying infrastructure must be protected against service disruption (in which the network is not available for its intended use) and service theft (in which an unauthorized user accesses network bandwidth, or an authorized user accesses unauthorized services).
While most organizations focus on securing the application traffic, few put sufficient infrastructure focus beyond point solutions such as firewalls. To protect the total network, security must be incorporated in all layers and the complete networking life cycle. Ten steps to secure networking - Computerworld
Back to: PC Security, privacy news