Security Administration in an Open Networking Environment
نویسنده
چکیده
As networking technologies evolve and business needs change, traditionally isolated and secure communication networks are giving way to more open computing environments. Security, network and systems administrators must therefore concern themselves not only with firewall and boundary security, but also with individual system security. Security administration in a large open network is a challenging assignment and requires a combination of auditing, assessment and compliance mechanisms. For very large networks, automation is another variable which is critical to consider in this equation. There are several tools available to assess the security of networks and systems; however, there are few freely available solutions for addressing the problems that these analysis tools detect. This paper describes the changing network security paradigm and discusses what tools are available for identifying security vulnerabilities in an open network environment. It goes on to state the problem that we faced at Sun and describes the suite of tools that we have designed and implemented as a solution, focusing on the automation of system security assessment and compliance. Finally, SunSWAT, the Sun Security Weakness Attack Tool, is introduced and its evolution from a single shell script designed to respond to the results of a network security audit, into a system for improving system security, implementing enterprise security standards and auditing to those standards, is discussed.
منابع مشابه
Reactive Power Pricing in an Open Access Environment Considering Combined Optimum Voltage Profile and Voltage Stability
In a de-regulated open access environment, reactive power is one of the ancillary services which must be provided by an Independent System Operator (ISO). In this paper, a new algorithm is proposed in which reactive power resources are initially so tuned that optimum security in terms of voltage profile and voltage stability are achieved while at the same time, the system losses are minimized. ...
متن کاملReactive Power Pricing in an Open Access Environment Considering Combined Optimum Voltage Profile and Voltage Stability
In a de-regulated open access environment, reactive power is one of the ancillary services which must be provided by an Independent System Operator (ISO). In this paper, a new algorithm is proposed in which reactive power resources are initially so tuned that optimum security in terms of voltage profile and voltage stability are achieved while at the same time, the system losses are minimized. ...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملIdentifying the effective factors and components in transferring learning to the work environment in in-service training of nurses in hospitals affiliated to the Social Security Organization
Background: The aim of this qualitative study was identifying the effective factors and components in transferring learning to the work environment in in-service training of nurses in hospitals affiliated to the Social Security Organization. Materials and methods: The method was exploratory research and Data analysis was fundamental. The sample includes 35 members of hospital supervisor...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995