Tuesday, February 26, 2013

Network Security Model - Defining an Enterprise Security Strategy

Overview

These are the 5 primary security groups that should be considered with any enterprise security model. These include security policy, perimeter, network, transaction and monitoring security. These are all part of any effective company security strategy. Any enterprise network has a perimeter that represents all equipment and circuits that connect to external networks both public and private. The internal network is comprised of all the servers, applications, data, and devices used for company operations. The demilitarized zone (DMZ) represents a location between the internal network and the perimeter comprised of firewalls and public servers. It that allows some access for external users to those network servers and denies traffic that would get to internal servers. That doesn't mean that all external users will be denied access to internal networks. On the contrary, a proper security strategy specifies who can access what and from where. For instance telecommuters will use VPN concentrators at the perimeter to access Windows and Unix servers. As well business partners could use an Extranet VPN connection for access to the company S/390 Mainframe. Define what security is required at all servers to protect company applications and files. Identify transaction protocols required to secure data as it travels across secure and non-secure network segments. Monitoring activities should then be defined that examine packets in real time as a defensive and pro-active strategy for protecting against internal and external attacks. A recent survey revealed that internal attacks from disgruntled employees and consultants are more prevalent than hacker attacks. Virus detection should then be addressed since allowed sessions could be carrying a virus at the application layer with an e-mail or a file transfer.

Security Policy Document

Network Security Model - Defining an Enterprise Security Strategy

The security policy document describes various policies for all employees that use the enterprise network. It specifies what an employee is permitted to do and with what resources. The policy includes non-employees as well such as consultants, business partners, clients and terminated employees. In addition security policies are defined for Internet e-mail and virus detection. It defines what cyclical process if any is used for examining and improving security.

Perimeter Security

This describes a first line of defense that external users must deal with before authenticating to the network. It is security for traffic whose source and destination is an external network. Many components are used to secure the perimeter of a network. The assessment reviews all perimeter devices currently utilized. Typical perimeter devices are firewalls, external routers, TACACS servers, RADIUS servers, dial servers, VPN concentrators and modems.

Network Security

This is defined as all of the server and legacy host security that is implemented for authenticating and authorizing internal and external employees. When a user has been authenticated through perimeter security, it is the security that must be dealt with before starting any applications. The network exists to carry traffic between workstations and network applications. Network applications are implemented on a shared server that could be running an operating system such as Windows, Unix or Mainframe MVS. It is the responsibility of the operating system to store data, respond to requests for data and maintain security for that data. Once a user is authenticated to a Windows ADS domain with a specific user account, they have privileges that have been granted to that account. Such privileges would be to access specific directories at one or many servers, start applications, and administer some or all of the Windows servers. When the user authenticates to the Windows Active Directory Services distributed it is not any specific server. There is tremendous management and availability advantages to that since all accounts are managed from a centralized perspective and security database copies are maintained at various servers across the network. Unix and Mainframe hosts will usually require logon to a specific system, however the network rights could be distributed to many hosts.

· Network operating system domain authentication and authorization

· Windows Active Directory Services authentication and authorization

· Unix and Mainframe host authentication and authorization

· Application authorization per server

· File and data authorization

Transaction Security

Transaction security works from a dynamic perspective. It attempts to secure each session with five primary activities. They are non-repudiation, integrity, authentication, confidentiality and virus detection. Transaction security ensures that session data is secure before being transported across the enterprise or Internet. This is important when dealing with the Internet since data is vulnerable to those that would use the valuable information without permission. E-Commerce employs some industry standards such as SET and SSL, which describe a set of protocols that provide non-repudiation, integrity, authentication and confidentiality. As well virus detection provides transaction security by examining data files for signs of virus infection before they are transported to an internal user or before they are sent across the Internet. The following describes industry standard transaction security protocols.

Non-Repudiation - RSA Digital Signatures

Integrity - MD5 Route Authentication

Authentication - Digital Certificates

Confidentiality - IPSec/IKE/3DES

Virus Detection - McAfee/Norton Antivirus Software

Monitoring Security

Monitoring network traffic for security attacks, vulnerabilities and unusual events is essential for any security strategy. This assessment identifies what strategies and applications are being employed. The following is a list that describes some typical monitoring solutions. Intrusion detection sensors are available for monitoring real time traffic as it arrives at your perimeter. IBM Internet Security Scanner is an excellent vulnerability assessment testing tool that should be considered for your organization. Syslog server messaging is a standard Unix program found at many companies that writes security events to a log file for examination. It is important to have audit trails to record network changes and assist with isolating security issues. Big companies that utilize a lot of analog dial lines for modems sometimes employ dial scanners to determine open lines that could be exploited by security hackers. Facilities security is typical badge access to equipment and servers that host mission critical data. Badge access systems record the date time that each specific employee entered the telecom room and left. Cameras sometimes record what specific activities were conducted as well.

Intrusion Prevention Sensors (IPS)

Cisco markets intrusion prevention sensors (IPS) to enterprise clients for improving the security posture of the company network. Cisco IPS 4200 series utilize sensors at strategic locations on the inside and outside network protecting switches, routers and servers from hackers. IPS sensors will examine network traffic real time or inline, comparing packets with pre-defined signatures. If the sensor detects suspicious behavior it will send an alarm, drop the packet and take some evasive action to counter the attack. The IPS sensor can be deployed inline IPS, IDS where traffic doesn't flow through device or a hybrid device. Most sensors inside the data center network will be designated IPS mode with its dynamic security features thwarting attacks as soon as they occur. Note that IOS intrusion prevention software is available today with routers as an option.

Vulnerability Assessment Testing (VAST)

IBM Internet Security Scanner (ISS) is a vulnerability assessment scanner focused on enterprise customers for assessing network vulnerabilities from an external and internal perspective. The software runs on agents and scans various network devices and servers for known security holes and potential vulnerabilities. The process is comprised of network discovery, data collection, analysis and reports. Data is collected from routers, switches, servers, firewalls, workstations, operating systems and network services. Potential vulnerabilities are verified through non-destructive testing and recommendations made for correcting any security problems. There is a reporting facility available with the scanner that presents the information findings to company staff.

Syslog Server Messaging

Cisco IOS has a Unix program called Syslog that reports on a variety of device activities and error conditions. Most routers and switches generate Syslog messages, which are sent to a designated Unix workstation for review. If your Network Management Console (NMS) is using the Windows platform, there are utilities that allow viewing of log files and sending Syslog files between a Unix and Windows NMS.

Copyright 2006 Shaun Hummel All Rights Reserved

Network Security Model - Defining an Enterprise Security Strategy
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Shaun Hummel is the author of Network Planning and Design Guide and http://www.CiscoDesignBooks.com featuring Networking Books, eBooks, Certifications, Articles and Design Tools.

watch cell phone Best Buy Hobo Icu2T Timber Duck Calls Cheap Best Buy Roc N Soc Nitro Throne Black

Tuesday, February 19, 2013

Dish Network Internet Connection - What You Should Consider

When choosing Dish Network internet connection, there are two very important things that you must take into your careful consideration. The first is price and the second is service. If you are looking for the best deal in Dish Network system, make sure that you get the best service at a price that suits your budget.

Price Consideration

One of the best Dish Network Internet providers is HughesNet whose a new offer for their Dish Network internet service. The new price is .99 after 0 cash back. At present, they are offering a smaller equipment charges, or no charge at all. This is what fierce competition has forced them to do.

Dish Network Internet Connection - What You Should Consider

Service Consideration

If we talk about service, it is not an exaggeration to say that combination package of Dish Network with high-speed Internet connection is the future. There are lots of reasons to support this claim. For example, no subscriber wants to deal with numerous companies for various services when they can get them together in one place. Like any other prudent customer, you also look for simplicity and less hassle. And, it is much easier to deal with a single company that is willing to discount multiple services. This is something that makes the combination package more valuable as well as more viable.

DISH Network high-speed Internet service combination package lets you surf the web faster and download files at a fraction of the time it takes with dial-up service. You do not have to dial a number and wait to log on. The package lets you get online instantly. You can download files in a matter of seconds and check your email instantly What is more, you do not miss important phone calls while you are online because the dish network system keeps the Internet connection separate from the phone line.

If you love the channel selection and all that a dish network system has to offer, the combination package of dish network that includes high-speed Internet connection is an ideal choice for you. However, you must also keep in mind that Dish Network System combined with high-speed Internet connection is not available in all areas and not every retailer offers the same. Therefore, if you are seriously considering going for a system, do not forget to call the support center in your area.

Dish Network Internet Connection - What You Should Consider
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Click here to check out great deals on Dish Network Internet services online. You can get free Dish Network for up to four rooms for only .99 a month. Read also useful guides on how to compare Dish Network and DirecTV smartly.

cell phone watches Save 13 On Trademark Miller Girl In The Best Offer Cane Creek 110 Zerostack Headset

Wednesday, February 6, 2013

DLNA (Digital Living Network Alliance) Overview For Your Home and iPad

Looking through your home, you have probably purchased many devices for fun and entertainment. From PCs, TVs, radios, stereos, to mobile devices. Whether you own 2 or even 10 devices, you want them to be compatible. DLNA (Digital Living Network Alliance) is a standard used by manufacturers of consumer electronics to allow devices within the home to share content through a person's home network. DLNA Certified products are built to work together even though they are built by different companies. DLNA certification ensures a device has been tested and proven compatible with various CE, PC and mobile devices designed according to the DLNA Interoperability Guidelines. Unfortunately, the iPad does not support DLNA natively. The work around is purchasing a DLNA app that allows your iPad to interface with the rest of your consumer electronics. With a DLNA ipad App, you can watch and listen to videos and music located on your iPad and vice versa. Please note that you can only play formats on your iPad that the iPad supports.

No matter what the product or who manufacture it. With a DLNA certified devices you can

Send and display movies

DLNA (Digital Living Network Alliance) Overview For Your Home and iPad

Find and play movies

Find,send and play music

Upload photos

Download music

Send and Print photos

DLNA Overview

Currently there are over 23 promoting members and countless participaing members. Among the most well know promoting members are Cisco Systems, Broadcom, Comcast, Hewlett-Packard, IBM, Intel, LG Electronics, Microsoft, Motorola, Nokia, Panasonic, Samsung, Sony, and Toshiba. A full list can be found here: http://www.dlna.org/about_us/roster/

Setting up your DLNA network in two steps.

1) Simply set a wired or wireless home connection. DLNA works off an IP address much like your current wireless printer or other wireless device.

2) Buy only DLNA compliant products. A list of compliant products can be found here: http://www.dlna.org/digital_living/possibilities/

If you are interested in making your iPad DLNA compliant, below is a list of tested iPad Apps. We'll be adding more reviews and expanding the list as the apps become more readily available.

iPad DLNA Apps:

1) Plugplayer.com.

DLNA (Digital Living Network Alliance) Overview For Your Home and iPad
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

John Noel has been a Apple user and technology expert for over a decade. He is a graduate of the University of California, Berkeley holding a Masters in Computer Science. Come visit his website at http://www.myappworld.com/ which helps people find the best DLNA iPad Apps as well as the latest Apple products and apps reviews.

watch mobile phone Best Buy Chippendale Fish Fork With Hollow Handle

Monday, February 4, 2013

Wireless Network Components - Basics of Any Wireless Network

Client Software and Adapter

Any client computer, laptop or wireless device with a compatible wireless client adapter allows connectivity with an access point. The client adapter is a radio transmitter with firmware that supports any of 802.11a/b/g signaling. That is needed before the device can associate and authenticate with the access point. Some access points have a no client mode that doesn't allow any association from clients extending network distance. Client wireless software included with the adapter must be implemented with specific Windows platforms. The client adapter will be integrated with the laptop, PCMCIA slot or desktop PCI bus slot. They will support specific wireless standards, antenna characteristics, WiFi certification, WDS, network range and security. The wireless manufacturer software must be implemented for all available features. The following is a list of some client adapter configured settings.

Access Point (AP)

Wireless Network Components - Basics of Any Wireless Network

As the name suggests an AP (access point) allows connectivity between the wireless client or wireless device and the wired network. The AP takes wireless data packets from a client and translates them to standard Ethernet data frames before transmitting across the wired network. Standard category 5 twisted pair cabling will connect the AP point Ethernet port with a catalyst switch Ethernet port. The maximum distance between access point and network switch is 100 meters standard with Ethernet design.

WLAN Controllers

Wireless designs with hundreds of root APs on an enterprise network will sometimes deploy wireless LAN controllers. The design specifies lightweight APs connecting to a network switch. The 4404 WLAN controller device acts as a hub connecting 4 network switches supporting 100 access points. Cisco wireless control system (WCS) wireless network management software is sometimes deployed with WLAN controller design for planning, configuring and optimizing the network.

Power Injector

Cisco access points have a variety of power options such as AC adapters, power over Ethernet and power injectors. The placement of APs is such that in some situations an AC power outlet isn't available. Should your Ethernet switch not support power over Ethernet, an option such as power injectors extends the distance from an AC outlet. Distances of 1.24 miles are available with a fiber optic media converter.

Power over Ethernet

Cisco access points can be deployed with power over Ethernet (PoE) should the network switch modules support that feature. The distance of 300 feet is the same with Cisco prestandard and 802.3af. The Cisco prestandard use Cat 5 cabling pins 1, 2, 3, 6 for powering devices while 802.3af uses 1, 2, 3, 6 with 10/100/1000BaseT signaling and 4, 5, 7, 8 with 10/100BaseT. Select a network switch module with the power over Ethernet standard your AP has implemented and has a power wattage rating per port for your specific devices. The network switch power supply should be upgraded to support additional power draw from multiple devices. Deploying power over Ethernet will decrease implementation costs with deployment of IPT, wireless and Gigabit. See network switch documents at Cisco web site for information on what network switching modules support PoE and wattage ratings. 802.3af defines powered device class 2 at 3.84W - 6.49W and class 3 at 6.49W - 12.95W.

Power Patch Panel

Cisco inline power patch panels can be deployed where Ethernet switches don't support power over Ethernet and power injectors aren't an option. The patch panel does no switching. It powers the devices through a Cat 5 cable that is a maximum 300 feet at a specific rated wattage per port. The patch panel connects the access point to the wired switch with a patch cable.

Wireless Network Components - Basics of Any Wireless Network
Check For The New Release in Health, Fitness & Dieting Category of Books NOW!
Check What Are The Top Cooking Books in Last 90 Days Best Cheap Deal!
Check For Cookbooks Best Sellers 2012 Discount OFFER!
Check for Top 100 Most Popular Books People Are Buying Daily Price Update!
Check For 100 New Release & BestSeller Books For Your Collection

Shaun Hummel is the author of Cisco Wireless Network Design Guide and CiscoDesignBooks.com featuring Networking Books, eBooks, Certifications, Design Tools and Articles

watches cell phone Save On Surgex Sx1115 Rt Surge Eliminator And Best Buy Chippendale Fish Fork With Hollow Handle Best Buy Hobo Icu2T Timber Duck Calls Cheap