Solved

Designing a secure network

Posted on 2007-03-21
1
180 Views
Last Modified: 2010-04-17
Factors in network security system design are trust, boundaries assumptions and human factors. How are these factors involved in the design of a secure network?
0
Comment
Question by:Labid68
1 Comment
 
LVL 2

Accepted Solution

by:
flscott earned 250 total points
ID: 18781449
Trust is established through Certificates, Passwords, Encryption Keys, etc.
Boundaries Assumptions can be defined as File/Folder Permissions, Network Traffic Rules, etc.
Human factors are endless. Usually you want to limit or eliminate human factors in a secure network. (I.E. You cant expect Sally in marketing to create a strong password and verify the integrity of her machine.)
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Network ports are the threads that hold network communication together. They are an essential part of networking that can be easily ignore or misunderstood, my goals is to show those who don't have a strong network foundation how network ports opera…
David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question