|
Security Architecture
A structured approach to system security that is typically composed of three efforts:
- Definition
- Maintenance
- Measurement
Taken together, these three processes serve to define the rationale for the security system, how it is to be operated and maintained and by which means it can be demonstrated to be functioning correctly.
Security Requirements
A collection of performance characteristics that defines the targets against which the performance of an implemented security system will be
measured. The security requirements documents define the general context of the approach, the assets to be secured and any roles, situations or other implementation-specific information that is deemed
appropriate and necessary.
Security System Maintenance
Security Audit
Internet Security Issues
The body of knowledge surrounding the security industry, security resources and the ever-expanding universe of security advisoriesl alerts and
remediations. There are many resources available to research this topic, some of which are SANS
, CERT, insecure.org, slashdot.com and many, many others.
Internet Security Architecture
A security architecture that has been specifically designed for performance using Internet-based technologies or public/insecure networks,
typically focusing on three aspects of "public computing":
- Remote Access
- Website Access (Public/Semi-Private/Private)
- mail
The above are almost always policy driven.
Firewall
A system tasked with protecting the boundary of a given asset. Some companies have one firewall at the ingress/egress
point of the corporation, some have them at the departmental or facility level. Regardless of the number or physical location of the firewall, the role of a firewall is constant - to raise the difficulty of unauthorized penetration of the facilities protected by the firewall. Many different types of firewall exist and at several different layers of the
ISO MODEL.
Web Security
E-mail Security
Data Encryption
A means of securing (usually) digital data through the use of an algorithm shared by interested, authorized parties. Plaintext
is sent through an encryption process, producing ciphertext. To obtain plaintext once more, the ciphertext is sent through a decryption
process - which should render an exact replica of the original plaintext. Data encryption is also the general term used to collectively describe all the above processes and technologies
Message Digest
Digital Signature
Digital Certificate
|