Wednesday, October 9, 2019
Information Infrastructure Essay Example | Topics and Well Written Essays - 1000 words
Information Infrastructure - Essay Example The Internet is an amalgam of thousands of interconnected networks. Some of these networks are vast global networks like Worldcom (MCI) or Cable & Wireless while others are small local networks like a corporation. The individual networks that compose the Internet are commonly called autonomous systems (AS) and number roughly 12,000 active AS'S with 22,000 assigned and roughly 65,000 AS'S possible (Gao 2001). The task of trying to provide a minimum level of security for all these networks is a daunting effort, but one that has been increasingly highlighted as an economic imperative (Lakhina et a1 2002). The implication here is that despite its depiction by Internet engineers as an "amorphous cloud" (Kostas et al. 1998), has a definite physical structure and hierarchy. In the simplest sense, the Internet is a network - or, more accurately, a network of networks. The Internet is composed of a wide variety of small, medium and large networks that all interconnect to different degrees to give the seamless impression of one big machine to the end-user (Kostas et al. 1998). ... Kabay (2005) provides us with a rudimentary framework for the stated by highlighting the obvious importance of location, whether geographic or within the organization. As regards the geographic aspect, networks should be positioned in a safe neighbourhood, as in one which does not have a high breaking, entry and burglary incident rate, and which is, further, not position in a vulnerable accident area, as in near an airport or by a highway. The implication here is that the first step towards physical security lies in the geographic location of the entity's network system. Within the parameters of location, the second consideration is the location of the network/server within the organization itself. As Kabay (2005) contends, the network should be positioned for maximum security and, at the same time, easy access. Maximum security implies placement in low risk areas, as in areas which are not vulnerable to external or internal threats. At the same time, the identified maximum security area cannot be such that access to it is problematic (Kabay, 2005). Upon resolution of the location question, physical security issues need to resolved. As noted in the Little Black Book of Computer Security, under no circumstances should unauthorized personnel ever be given the opportunity to access the network, or ICT facilities. Most obviously, this means that employees should keep doors closed at all times and should an employee step out, he/she must make sure that he/she has closed the door behind him/her. Even though this may sound as an unnecessary statement of the obvious, the fact is that employees often forget this basic rule and, as a result, leave
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.