?
Solved

Designing a secure network

Posted on 2007-03-21
1
Medium Priority
?
184 Views
Last Modified: 2010-04-17
Factors in network security system design are trust, boundaries assumptions and human factors. How are these factors involved in the design of a secure network?
0
Comment
Question by:Labid68
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 2

Accepted Solution

by:
flscott earned 1000 total points
ID: 18781449
Trust is established through Certificates, Passwords, Encryption Keys, etc.
Boundaries Assumptions can be defined as File/Folder Permissions, Network Traffic Rules, etc.
Human factors are endless. Usually you want to limit or eliminate human factors in a secure network. (I.E. You cant expect Sally in marketing to create a strong password and verify the integrity of her machine.)
0

Featured Post

Bringing Advanced Authentication to the SMB Market

WatchGuard announces the acquisition of advanced authentication provider, Datablink, with one mission – to bring secure authentication to SMB, mid-market, and distributed enterprises with a cloud-based solution, ideal for resale via their established channel & MSSP community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question