Share


Share

Share it !



share/bookmark
Showing posts with label Strategy. Show all posts
Showing posts with label Strategy. Show all posts

Network Management Strategy


Those in network management function as security, monitoring, control, allocation, deployment, coordination and planning personnel for a businesses network. Network management therefore describes the act of managing all of those roles. There are lot of protocols that exist for the operation of network management and its support including programs such as CMIP, Common Information Model, Java Management Extensions, Netconf, SNMP, Transaction Language 1 and WBEM.

The most important area of network marketing is routing. Routing is the process in which people select a path within a computer network that will be used to send data back and forth between computers. This area of network management focuses on using nodes, or more often they are referred to as routers, to pass logically addressed packets of information from their source to their destination in a process called forwarding. This is typically done through the use of routing tables which keep up a record of the most efficient routes on which to transfer the information.

Another key aspect of network management is security management. The goal of security management is to protect the network from unauthorized access which includes all of the networks sub-functions including the authorization of subscriber access, the distribution of security related events, control of distributing cryptographic keying material and the reporting of security related events.

Both the security and quality aspects of network management are related to configuration management. This is the department that manages security features in a specific business network by controlling any and all changes that are to be made to the software, hardware, firmware, documentation and test features within the businesses system. As the companies network system changes and grows the configuration management team keeps the system under control and is responsible for maintaining both security and quality.

Then there are two main areas of the software configuration management. The first area focuses on storing entities from the software development project, sometimes referred to as the component repository management. The other area is known as engineering support and is focused on producing these entities.

In order to have a successful network management team there also need to be an accounting management. This team focuses on the financial status of the business network by controlling and reporting its functions. Accounting management accomplishes this by doing analysis, planning and controlling the financial data and reporting any managerial decisions. Those involved in accounting management will work with bank account maintenance, developing financial statements and analyzing the businesses cash flow and financial health.




Jen Carter is team member and writes regularly about computer network consulting, network security and LAN Consulting




UAVs Hacking Wireless Networks - Latest Threat, Military Strategy, or Surveillance Tool?


At the famous hacker convention in Las Vegas, some of the computer security industry professionals there have created a UAV which can fly around and break into computer systems via their wireless connections. Is this a new scheme? Is this an innovative idea? I would submit to you that it's not a new original thought, as I had written an article about this a year or so ago on such a concept, and there are old tales of UFOs flying over missile silos containing ICBMs during the Cold War, and shutting down the entire system.

Yes I know, talking about UFOs, or unidentified flying objects, seems a little bizarre. But, whether or not those stories are true, hardly matters, because the stories go back to the 1970s and really this new hacking technique, which will probably be used by the US military is not a new thought, we can trace its origins back over four decades. Nevertheless, it is interesting new technology, and perhaps we should discuss this.

There was an interesting article in Physorg [dot] com recently on August 6, 2011 titled; "Hacker drone launches airborne cyber attacks," written by Glenn Chapman which stated;

"Computer security specialists built a small MAV drone aircraft that can launch airborne cyber attacks, hijacking mobile phone calls, or even delivering a dirty bomb. It is loaded with software to attack Wi-Fi, Bluetooth, and GSM cell networks. The MAV grabs packets of data sent on wireless networks or unsecured hot spots as gateways to get in to computer systems. It can get GMS mobile phone IDs used to bill outgoing calls. Hackers can impersonate cell phone towers and eavesdrop on people's calls."

Perhaps, this is a good reason for people to secure their Wi-Fi at home, or in their businesses, and not leave open networks, because hackers can break in. It's also a good reason for government computer systems, and large corporations to think twice about having any sort of wireless communication too accessible, or allowing too much information to flow through them, which is of high value, proprietary, secret, or involving financial transactions.

We've always known that someone can park a Van near a Wi-Fi connection, and attempt to break into the computer system. In Silicon Valley there were computer professionals which did this quite often to test the security of various corporations. Flying a small model airplane or micro air vehicle, or even a military UAV over a location to get into the system might indeed help the cyber warfare division of the US military. We can also expect that our enemies will try to do this to us too, and unfortunately we can also expect criminal hackers to try to break into our personal information in this way.

Indeed, just when you thought it was safe to use your mobile phone, Wi-Fi, or wireless network - someone has invented a new way to get in. Be careful out there folks, indeed I hope you will please consider all this and think on it when you are devising a strategy for Internet security and safe mobile phone transactions.




Lance Winslow is a retired Founder of a Nationwide Franchise Chain, and now runs the Online Think Tank. Lance Winslow believes writing 24,444 articles by September 4th at 4:44 PM will be difficult because all the letters on his keyboard are now worn off now..




Cyber Security Strategy - The 4 Laws of Information Security


Technology infrastructure is today a critical asset with all of its digital business information being the new currency. What are the risks to sensitive business information and the associated vital assets? What are your security blind spots? Cyber security is about applying the appropriate defense to protect your critical business assets. Businesses today are highly dependent on technology to deliver services, interact with customers and manage a supply chain. What is your cyber security strategy to ensure that you maintain a reasonable level of vigilance against cyber threats? We introduce the four laws of information security - these laws provide insight valuable for organizations to develop their security strategy.

We start our journey by diving head first into the defenses of the human body. So much can be learned from one of the most studied subject of all times. We examine the human body's outer and inner defense capabilities primed to attack viruses and bacteria. We then analyze immune responses to fight diseases through complicated mechanisms involving special white blood cells and action of the lymphatic system that include vessels and nodes that extend around the entire body. The human body provides an excellent case study in fighting threats in the journey from prevention to detection.

We reflect on human body defenses to better understand core components of an organization's cyber security strategy. An organization's cyber security strategy establishes vital security priorities aligned with the business mission to enable integrated defense capabilities. Like the human body, the cyber defense capabilities need to be robust, roving and lead ultimately to a resilient enterprise that is primed to address active, passive threats that may be from the inside or outside.

With information being the new currency of all businesses, we examine the requirements of enabling a technology architecture that is self-healing, highly resilient to threats that can be seriously disruptive to business processes. This is especially important since threats today are more sophisticated, increasingly covert and highly targeted against a technology architecture whose edges are being stretched as a direct consequence of Web-based applications, mobile computing and virtualization. It is about establishing a cyber security strategy that is tailored to your organization and the risks that need to be treated appropriately.




Uday Ali Pabrai, CISSP (ISSAP, ISSMP), Security+, is the chief executive of ecfirst, an Inc. 500 business. A highly sought after information security and regulatory compliance expert, he has successfully delivered solutions on compliance and information security to hundreds of organizations worldwide. Mr. Pabrai has presented opening keynote and been a featured speaker at several conferences. Mr. Pabrai is a member of the U.S. FBI InfraGard.