Solved

Designing a secure network

Posted on 2007-03-21
1
181 Views
Last Modified: 2010-04-17
Factors in network security system design are trust, boundaries assumptions and human factors. How are these factors involved in the design of a secure network?
0
Comment
Question by:Labid68
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 2

Accepted Solution

by:
flscott earned 250 total points
ID: 18781449
Trust is established through Certificates, Passwords, Encryption Keys, etc.
Boundaries Assumptions can be defined as File/Folder Permissions, Network Traffic Rules, etc.
Human factors are endless. Usually you want to limit or eliminate human factors in a secure network. (I.E. You cant expect Sally in marketing to create a strong password and verify the integrity of her machine.)
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Network Devices Audit Log 2 41
Cisco RSTP portfast 3 83
Developing a front end to SPLUNK 1 65
Expand Verizon 3G to LTE - possible? 4 37
I was at a customer and we recently set up a new DNS Server.  I asked him to ensure that all servers pointed to the new server.  140 remote servers – estimated 6 days of work to do this manually. Ever had this experience and just need to get the …
So, you're experiencing issues on your network and you've decided that you need to perform some tests to determine whether your cabling is good.  You're likely thinking that you may need to spend money which you probably don't have on hiring/purchas…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question