Information assurance security framework for enterprise networks

被引:0
|
作者
Kesari, MD [1 ]
Velayutham, T [1 ]
Sudarsan, SD [1 ]
Jagadhane, M [1 ]
Sailaja, U [1 ]
机构
[1] Bharat Elect Ltd, Cent Res Lab, Bangalore 13, Karnataka, India
来源
SAM '05: Proceedings of the 2005 International Conference on Security and Management | 2005年
关键词
information assurance; log analysis; security framework;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today Networks play a vital role and act as the information center of industries, enterprises and organizations of Civilian and Defense sectors. The networks are helping to transfer vital and often highly sensitive information while ordinary users are also connected to access network. Protecting the information of an enterprise is a must in the competitive world of information age. With the growing network size and complexity, their protection from threats has become increasingly difficult. The problem with network security solutions is that technology driven, non-integrated products such as firewalls and intrusion detectors provide only protection for specific type of threats. But the need for the organization today is comprehensive coverage of threats to their enterprise networks. Individual security products often lack inter-operability, scalability and ease of manageability. So a holistic security management and centralized control solution that integrates and manages the different security appliances is required for enterprise networks. This paper offers implementation of such solution for information security management. In any organization information assurance is very much important. It requires integrity of the network system with respect to security appliances of different varieties in the network. Information assurance also requires centralized log gathering and analysis for getting unified view, which will make monitoring and troubleshooting easier. Centralized log analysis helps in timely situation awareness with respect to organizational policy implementation. This will also help in easy classification of the policy violations caused either by the known source (administrators) or external malicious users, thus providing the information assurance to the organization.
引用
收藏
页码:180 / 184
页数:5
相关论文
共 50 条
  • [21] Enhancing Information and Communications Networks Safety through Security Transparency Assurance Technology
    Kishimoto, Io
    Nakajima, Kazuaki
    Ueda, Hirofumi
    NEC Technical Journal, 2023, 17 (01): : 132 - 136
  • [22] Assurance of Information Systems' Quality and Security
    Izonin, Ivan
    Hovorushchenko, Tetiana
    Popov, Peter
    Journal of Cyber Security and Mobility, 2023, 12 (03):
  • [23] Embracing the Diversity of Information Assurance & Security
    Myers, J. Paul, Jr.
    Riela, Sandra
    IMSCI '08: 2ND INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL 1, PROCEEDINGS, 2008, : 215 - +
  • [24] Information security assurance lifecycle research
    XIE, Cheng-shan
    XUJIA, Gu-yue
    WANG, Li
    Journal of China Universities of Posts and Telecommunications, 2007, 14 (04): : 77 - 81
  • [25] Regulatory Compliance and Information Security Assurance
    Tashi, Igli
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 670 - 674
  • [26] Tools for information security assurance arguments
    Park, JS
    Montrose, B
    Froscher, JN
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 287 - 296
  • [27] Strategic planning for information security and assurance
    Port, Daniel
    Kazman, Rick
    Takenaka, Ann
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 466 - 471
  • [28] Information security assurance lifecycle research
    XIE Cheng-shan State Key Laboratory of Information Security
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2007, (04) : 77 - 81
  • [29] Authenticity as a Component of Information Assurance and Security
    Rogers, Corinne
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 101 - 108
  • [30] Adopting an enterprise software security framework
    Steven, J
    IEEE SECURITY & PRIVACY, 2006, 4 (02) : 84 - 87