Information assurance security framework for enterprise networks

被引:0
|
作者
Kesari, MD [1 ]
Velayutham, T [1 ]
Sudarsan, SD [1 ]
Jagadhane, M [1 ]
Sailaja, U [1 ]
机构
[1] Bharat Elect Ltd, Cent Res Lab, Bangalore 13, Karnataka, India
来源
SAM '05: Proceedings of the 2005 International Conference on Security and Management | 2005年
关键词
information assurance; log analysis; security framework;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today Networks play a vital role and act as the information center of industries, enterprises and organizations of Civilian and Defense sectors. The networks are helping to transfer vital and often highly sensitive information while ordinary users are also connected to access network. Protecting the information of an enterprise is a must in the competitive world of information age. With the growing network size and complexity, their protection from threats has become increasingly difficult. The problem with network security solutions is that technology driven, non-integrated products such as firewalls and intrusion detectors provide only protection for specific type of threats. But the need for the organization today is comprehensive coverage of threats to their enterprise networks. Individual security products often lack inter-operability, scalability and ease of manageability. So a holistic security management and centralized control solution that integrates and manages the different security appliances is required for enterprise networks. This paper offers implementation of such solution for information security management. In any organization information assurance is very much important. It requires integrity of the network system with respect to security appliances of different varieties in the network. Information assurance also requires centralized log gathering and analysis for getting unified view, which will make monitoring and troubleshooting easier. Centralized log analysis helps in timely situation awareness with respect to organizational policy implementation. This will also help in easy classification of the policy violations caused either by the known source (administrators) or external malicious users, thus providing the information assurance to the organization.
引用
收藏
页码:180 / 184
页数:5
相关论文
共 50 条
  • [1] Information assurance for enterprise fiber optic networks
    DeCusatis, C
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 282 - 287
  • [2] Enterprise Information Systems Security: A Conceptual Framework
    Chaudhry, Peggy E.
    Chaudhry, Sohail S.
    Reese, Ronald
    Jones, Darryl S.
    RE-CONCEPTUALIZING ENTERPRISE INFORMATION SYSTEMS, 2012, 105 : 118 - +
  • [3] An enterprise assurance framework
    Landoll, DJ
    Williams, JR
    PROCEEDINGS OF THE 5TH WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '96), 1996, : 118 - 123
  • [4] A reference model for enterprise security -: High assurance enterprise security
    Enstrom, David W.
    Walsh, D'Arcy
    Hossendoust, Siavosh
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 355 - +
  • [5] An Approach to Information Security Policy Modeling for Enterprise Networks
    Chernyavskiy, Dmitry
    Miloslavskaya, Natalia
    COMMUNICATIONS AND MULTIMEDIA SECURITY, CMS 2014, 2014, 8735 : 118 - 127
  • [6] Enterprise wrappers for information assurance
    Feldman, M
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 120 - 122
  • [7] Enterprise Information Assurance Integration
    Johnson, George A.
    Lopez, Martin H.
    PROCEEDINGS OF THE 23RD INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS 2010), 2010, : 1345 - 1349
  • [8] A web-enabled enterprise security management framework based on a unified model of Enterprise Information System Security
    Sengupta, A
    Mukhopadhyay, A
    Ray, K
    Roy, AG
    Aich, D
    Barik, MS
    Mazumdar, C
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 328 - 331
  • [9] Information Security Threats and Information Assurance
    Yalman, Yildiray
    Yesilyurt, Murat
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2013, 2 (03): : 247 - 252
  • [10] INFORMATION SECURITY MANAGEMENT FRAMEWORK SUITABILITY ESTIMATION FOR SMALL AND MEDIUM ENTERPRISE
    Kauspadiene, Laima
    Ramanauskaite, Simona
    Cenys, Antanas
    TECHNOLOGICAL AND ECONOMIC DEVELOPMENT OF ECONOMY, 2019, 25 (05) : 979 - 997