Security Management Strategies and Defense and their uses.
1. PreparedbyRichardChalamila
1. Several types of security management strategies and defenses and its uses to ensure
the security of business applications of information technology.
i. Place encryption throughout network to ensure privacy – Encryption is a process of
converting message or digital data from plain text which any people can understand to
the cipher text by using special mathematical algorithms, or keys.
This encryption is necessary to be used when the computers is within the network
especially in the internet, extranet and intranet to protect the transmission of messages,
files and passwords.
ii. Use firewall technology for fine-grained security –Firewalls a part of computer system
or network which is designed to block unauthorized access while permitting outward
communication.
This firewalls it act like a gate by providing a password or other security code and it
filter all traffic inward or outward from the computer so it prevent the computer from the
intrusion of viruses and other harmfully hazard.
iii. Authenticate and authorize all network users – Authentication should be handled at
the earliest point of connection of the system to the network: even before the client is
assigned a network address. This combination of authentication and authorization should
form the basis of security policy. Example of authorization is providing Login form by
Password.
iv. Detect threats to the integrity of the network and remediate them –Integrity is to
ensure that the data must be protected from unauthorized, unanticipated, or unintentional
modification. Examples: Census information, economic indicators, or financial
transactions systems.
v. Include End-Point Security in Policy Enforcement – A user who successfully
identifies to the network should be given different privileges depending on the system
they are using for access. Most network managers are already aware of the problem of
end-point security and have tools such as anti-virus, personal firewall, and patch
management in place on many systems.