Solved

Designing a secure network

Posted on 2007-03-21
1
178 Views
Last Modified: 2010-04-17
Factors in network security system design are trust, boundaries assumptions and human factors. How are these factors involved in the design of a secure network?
0
Comment
Question by:Labid68
1 Comment
 
LVL 2

Accepted Solution

by:
flscott earned 250 total points
Comment Utility
Trust is established through Certificates, Passwords, Encryption Keys, etc.
Boundaries Assumptions can be defined as File/Folder Permissions, Network Traffic Rules, etc.
Human factors are endless. Usually you want to limit or eliminate human factors in a secure network. (I.E. You cant expect Sally in marketing to create a strong password and verify the integrity of her machine.)
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
installed old nagios.... 13 86
ports for sccm 2012 1 58
network + 7 72
How to monitor internet bandwidth usage on a server 7 52
Setting up SSH Cisco We are all told that you should not use Telent for connecting to devices because it is unsecure and all clear text. Much better is to use SSH, but it can seem a bit of a challenge setting it all up and especially in a small n…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now