PageRank
Information Technology, IT catalyzes your business. IT facilitates your life!       
USD $1
Begin main content

Network Infrastructure Security Overview

Network infrastructure refers to the grouping of physical hardware and logical components which are needed to provide a number of features for the network, such as connectivity, routing and switching capabilities,  networksecurity , and access control. The physical infrastructure of the network refers to the physical design of the network together with the hardware components. The logical infrastructure of the network consists of all the software components required to enable connectivity between devices, and to provide  network security . The network's logical infrastructure consists of software products and networking protocols and services.

While Windows Server 2003 provides a number of features and tools when you install it on a computer, you have to implement additional features and functionality on a server to provide the services and capabilities required by the organization and its users.

There are a number of different risks that have an impact on an organization. Some of the primary threats which you should address are listed here:

  • Environmental threats pertain to both environmental disasters and disasters due to human intervention. Examples of environmental threats are fires, earthquakes, storms, faulty wiring, and so forth.Designing Network Infrastructure Security

  • Accidental threats relate to threats which are caused without malicious intent. Accidental risks occur when an employee accidentally deletes important files, or modifies data that should not have been changed.

  • Deliberate threats relate to threats which are caused with malicious intent as the primary objective. Examples of deliberate threats are viruses, Trojan horses, and all other  network attacks  caused by hackers and intruders.

A typical security life cycle is consists of the following processes:

  • Determining and designing the security infrastructure: The design phase of the security life cycle includes elements such as identifying the resources of the organization that needs to be secured, and then designing the security infrastructure to protect these resources. The security design team should be accountable for creating and designing security policies for the organization.

  • Deploying and implementing security features and security policies: The security design team should also be responsible for implementing security features and security policies.

  • Continually managing the  security solution All security software should be upgraded as necessary, and audit logs should be regularly examined.

A number of common steps or processes have to be completed to design network  infrastructure security :

  • Determine the security requirements of the organization.

  • Plan network security which should be implemented.

  • Establish and create secure boundaries.

  • Implement security technologies for the network.

  • Implement server security technologies.

  • Implement application security technologies.

  • Implement user security technologies.

  • Implement an auditing strategy.

  • Implement a network monitoring strategy.

A few methods of securing your network infrastructure are listed here:

  • Physically secure all mission-critical network servers: A few guidelines and recommendations for implementing physical security are detailed below:

    • All servers should be secured in a locked server room.

    • Only those individuals that need access should be permitted to access the server room using a key or security code. You can also implement a mechanism that monitors who enters and leaves the server room.

    • All hubs, routers and switches should be placed in a wiring closet, or in a locked cable room.

    • You should use case locks on your servers. You can also install case locks on other systems that can be physically accessed.

    • You should restrict access to the floppy drive as well.
      Set a BIOS password on all systems. This would prevent an unauthorized person from accessing the BIOS.

    • You should change the operating system selection timeout interval to 0 in order for Windows to boot automatically.

    • When you are setting up Windows, disconnect the server from the Internet.

    • Install Windows operating systems to a NTFS partition.

    • Ensure that you use a strong local administrator password during setup.

  • Using the NTFS file system and its security features.

  • Using the Encrypting File System (EFS).

  • Securing network access points.

  • Enforcing user authentication.

  • Securing network access.

  • Enforcing the use of strong passwords.

  • Securing confidential network service data as it moves over the network.

  • Securing confidential application data as it moves over the network.

  • Securing confidential user data as it moves over the network.

Each Windows server operating system provides different features, and different security configurations which can be enabled to enhance network security and server security. Before deciding on the operating system to utilize, you have to know which security features are required for your network design, as determined by the organization's requirements.

Most organizations use a security design committee or team to determine the security needs of the organization and to deploy security policies which can meet these requirements.

The members of the network security design committee should be knowledgeable on a number of factors, including the following:

  • The mission critical resources of the organization.

  • The security weaknesses or vulnerabilities of the organization.

  • The threats to which the mission critical resources of the organization is exposed.

  • The resources which are mainly at risk.

  • The loss to the organization should particular resources of the organization be compromised.

  • The level of security needed to secure the organization's resources.

  • The security features and security policies which can be used to secure the resources of the organization.

  • The security features and security policies which are ideal to secure particular resources.

  • The impact of implementing security features and security policies on employees, users and administrators.

  • The requirements for deploying identified  security solutions

09:13 AM, 16 Nov 2012 by Iuri Sampaio Permalink | Comments (39910)

Understand SPF records [support.google.com]

Understand SPF records 

We recommend that you create a Sender Policy Framework (SPF) record for your domain. An SPF record is a type of Domain Name Service (DNS) record that identifies which mail servers are permitted to send email on behalf of your domain.

The purpose of an SPF record is to prevent spammers from sending messages with forged From addresses at your domain. Recipients can refer to the SPF record to determine whether a message purporting to be from your domain comes from an authorized mail server.

For example, suppose that your domain example.com uses Gmail. You create an SPF record that identifies the Google Apps mail servers as the authorized mail servers for your domain. When a recipient's mail server receives a message from user@example.com, it can check the SPF record for example.com to determine whether it is a valid message. If the message comes from a server other than the Google Apps mail servers listed in the SPF record, the recipient's mail server can reject it as spam.

If your domain does not have an SPF record, some recipient domains may reject messages from your users because they cannot validate that the messages come from an authorized mail server.

See Authenticate email with a domain key and Understanding DMARC for other anti-spoofing measures available to you through Google. 

09:14 AM, 14 Nov 2012 by Iuri Sampaio Permalink | Comments (3219)

Top 10 Ways to Make Money on the Internet [electronics.howstuffworks.com]

Top 10 Ways to Make Money on the Internet

by  and 

Unless you're a freegan and have found a way to live entirely off the grid, you probably need some sort of steady income in order to survive. The traditional way to earn money, of course, is by having a job. You work for a company or start your own, and the work you do earns you money, which you spend on things like a mortgage, rent, food, clothing, utilities and entertainment. 

11:47 AM, 13 Nov 2012 by Iuri Sampaio Permalink | Comments (5)

Affiliate Programs [money.howstuffworks.com]

How Affiliate Programs Work 

These days, it's remarkably easy to set up your own Web site. If you have a computer connected to the Internet, you can simply go to a site such as GeoCities or AOL and use their ready-made Web design templates to construct a simple personal page. These sites will give you a URL, store the content of your page and slap on some advertisements. Just like that, in an hour or two, your page is on the Web! 

­
But what if you want to take your site to the next level? If you have a content-driven Web site, how can you make money off your traffic? If you are an online merchant, how can you get people to your site to buy your products? One popular option that serves both of these functions is an affiliate program. In this article, we'll examine affiliate programs to find out what they are, how they work, who they are for and how you can use them to benefit your Web site. ­

05:19 AM, 11 Nov 2012 by Iuri Sampaio Permalink | Comments (2090)

XML

Archive

November 2012
S M T W T F S
       
10 
11  12  13  14  15  16  17 
18  19  20  21  22  23  24 
25  26  27  28  29  30   
November 2016
August 2016
June 2016
April 2016
March 2016
February 2016
January 2016
December 2015
October 2015
September 2015
August 2015
May 2015
March 2015
December 2014
June 2014
March 2014
September 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012

Notifications

Icon of envelopeRequest notifications

Syndication Feed

XML

Recent Comments

  1. Unregistered Visitor: xmpcOKZArBMdRs
  2. Unregistered Visitor: HAivjBFtqUIRHPrK
  3. Unregistered Visitor: YNvYYeIQtN
  4. Unregistered Visitor: VEDxsclRsOJcTaW
  5. Unregistered Visitor: NIwEAqESBvDBTWUG
  6. Unregistered Visitor: RJWDbORpiBgr
  7. Unregistered Visitor: dBsvVwbjLxCGKx
  8. Unregistered Visitor: MSKUawaCswTtzViGJyP
  9. Unregistered Visitor: CGMHBUBvIsAngqGFI
  10. Unregistered Visitor: aotHMhlirvfQzNutGG