By Sowmya.Y. Index Definition Aspects of Security Management Assessment criteria for designing...
-
Upload
jeffery-adams -
Category
Documents
-
view
212 -
download
0
Transcript of By Sowmya.Y. Index Definition Aspects of Security Management Assessment criteria for designing...
SECURITY MANAGEMENT FOR LARGE COMPUTER NETWORKS
By Sowmya.Y
Index
Definition Aspects of Security Management Assessment criteria for designing
Security Management System Conclusion References
ISO has defined five key functional areas of network management:
fault management accounting management configuration management performance management security management
Security Management:
Security Management is the process of controlling the security of a complex data network so as to maximize the security level that provides to its users.
Aspects of Security Management:
Security Management is one of the five management functions defined by ISO/OSI, which covers two aspects:
Management of Security(MoS) Security of Management(SoM)
Management of Security(MoS):
MoS(Management of Security) provides the means by which the security services, mechanisms and security related information are managed.
Security of Management(SoM):
SoM(Security of Management) covers security of all functions and security of communication of management system and information.
Assessment Criteria:
Scalability Flexibility-Extensibility Integration with existing IT
infrastructure Information aggregation and filtering Security of reserved information Minimization of resource allocation Customization
Scalability: A management tool must
be designed in such a way that it provides the same or improved services as the information and computing resources grow and become distributed.
Flexibility-Extensibility: A security
management tool must be capable to easily merge any changes to the corporate infrastructure.
Integration with existing information and technological infrastructure:
A Security Management tool must be designed to coexist with pre-established technological investments of organization's management.
Information aggregation and filtering: Depending on
the domain size the security administrator should be capable of deciding the aggregation and filtering level of the selected security information.
Security of reserved Information:
Sensitive information should be collected and exchanged by security management system’s components.
Minimization of resource allocation:
System that minimize the allocation of network resources required for its operation.
Customization: A Security
Management system must provide the security administrator with the potential to customize the collected security related information according to organizational needs and expectations.
Conclusion:
The derived tool can be easily integrated with existing network management tools
Our security network management architecture guarantees scalability and extensibility.
Integration and authentication of information is guaranteed
References:
http://www.cisco.com/en/US/docs/internetworking/technology/handbook/NM-Basics.html
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=740529
http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel5/6648/17751/00820481.pdf?arnumber=820481
Q & A
Thank You!!