We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3
Introduction
• Computers are an integral part of everyday operations.
Organizations depend on them. • Today the cost to business of stolen, misused, or altered information can be high, especially if real or purported damages to customers can be raced back to mismanagement. • That is why must value information resources within the context of your business goals and constraints. • The objective of security management is to eliminate or minimize computer vulnerability to destruction, modification, or disclosure. • If a security plan is to be effective, top management must be fully convinced of the need to take counteractive steps. • To assess the seriousness of a computer breakdown or loss of data, each business has to evaluate threats to the company, the potential losses if the threats are realized, and the time and cost that will be necessary to recover from any breach in security
Security problems are as follows:
Sixty years ago, very few people had access to computer system or network, and securing them was relatively an easy matter. • There are many different ways to attack computers and networks to take advantage of what has made shopping, banking, investment, and leisure pursuits a simple matter of “dragging and clicking” for many people. • The different types of electronic crime fall into two main Categories: crimes in which the computer was the target of the attack, and incidents in which the computer was a means of perpetrating a criminal act. • There are a number of different threats to security ,including viruses and worms, intruders, insiders ,criminal organizations, terrorists, and information warfare conducted by foreign countries. • The biggest change that has occurred in security over the last forty years has been the change in the computing environment from large mainframes to a highly interconnected network of much smaller systems Why network security is needed? • On September 11, 2001, terrorists seized control of four airplanes. Three were flown into buildings and the fourth crashed, with catastrophic loss of life. • In the after month, the security and reliability of many aspects of society drew renewed scrutiny. • One of these aspects was the widespread use of computers and their interconnecting networks. • The issue is not new. In 1988, approximately 5,000 computers throughout the Internet were rendered unusable within 4 hours by a program called “worm”. • While the spread, and the effects, of this program alarmed computer scientists, most people were not worried because the worm did not affect their lives on their ability to do their jobs. • In 1993, more users of computer systems were altered to such dangers when a set of programs called sniffers were placed on many computers run by network services providers and recorded login names and passwords. • Almost daily, it read about computer and network viruses either about new attacks or the dangers of more potent viruses that are difficult to track and stop. It strongly encouraged to install antivirus software if own a computer. • This increase in terrorist attacks on the general population, as well as on specific segments of our society’s infrastructure, comes at a time when large and small organizations of all types are becoming increasingly dependent on networks to carry on their activities. Networks have become assets like computers, data information. • Without these assets most organizations find it impossible to conduct business Communications with customers suppliers,employees and other organizations are handled primarily through networks. • The network asset must be protected like other assets and surrounded with proper controls and the appropriate security. • Organizational leaders and employees in all segments want to know what they can do to safeguard networks, their computers, and their livelihoods. Management principles • “Network Security Policy” is management’s statement of the importance of their commitment to network security). • The network security policy needs to clearly state management’s position about the importance of network security and the items that are to be protected. • Management must understand that there is no such thing as a perfectly secure network. • Network security is a constantly moving target because of the advances in technology and the creativity of people who would like to break into a network of its attached computers. For a company to adequately manage information security on the network, it must have the following: 1. A network security policy clearly defines the reasons why security is important to the company. 2. Clearly defined roles and responsibilities to ensure that all aspects of security are performed. 3. A security implementation plan that describes the steps needed to implement the policy. 4. An effective implementation of appropriate security hardware and software. 5. A plan to deal with any security breaches that do occur. 6. A management review process to periodically ensure that the security policies and standards are adequate, effective and are being enforced.