Newsletter
Hjem > Ressurser > Tekniske Ressurser > Black Box forklarer > Security > Five key elements of effective network security.
Navigasjon
 
Five key elements of effective network security.

Identity
Accurate and positive identification of network users, hosts, applications, services, and resources is a must. Kerberos, password tools, and protocols such as RADIUS and TACACS+ enable identification.

Perimeter security
This enables you to control access to network applications, data, and services so only authorised users and information can pass through the network.

Data privacy
Data privacy is the providing of confidential data on command to authorised users while protecting that information from eavesdropping or tampering. Tunnelling, encryption technologies, and protocols like IPSec provide important protection when implementing Virtual Private Networks (VPNs).

Security monitoring
You also should regularly test and monitor security preparations. By being proactive, you can identify areas of weakness and make adjustments. When a real security event occurs, you’ll be ready.

Policy management
It’s likely your network will grow in size and complexity. You’ll need centralised policy-management tools that use directory services to grow with the network. These tools define, distribute, enforce, and audit the security policy through browser interfaces, plus they enhance the usability and effectiveness of your network’s security solutions.