Security Management for Large Computer Networks
160 likes | 302 Vues
This document explores the complexities of Security Management within large computer networks, as defined by ISO's five key functional areas. It covers essential aspects such as Management of Security (MoS) and Security of Management (SoM), detailing assessment criteria for designing effective security management systems. Key focus areas include scalability, flexibility, integration, and data security. The conclusion emphasizes the importance of developing a customizable tool that integrates smoothly with existing network management systems to enhance security levels for users.
Security Management for Large Computer Networks
E N D
Presentation Transcript
By Sowmya.Y Security Management for Large Computer Networks
Index • Definition • Aspects of Security Management • Assessment criteria for designing Security Management System • Conclusion • References
ISO has defined five key functional areas of network management: • fault management • accounting management • configuration management • performance management • security management
Security Management: Security Management is the process of controlling the security of a complex data network so as to maximize the security level that provides to its users.
Aspects of Security Management: • Security Management is one of the five management functions defined by ISO/OSI, which covers two aspects: • Management of Security(MoS) • Security of Management(SoM)
Management of Security(MoS): • MoS(Management of Security) provides the means by which the security services, mechanisms and security related information are managed.
Security of Management(SoM): • SoM(Security of Management) covers security of all functions and security of communication of management system and information.
Assessment Criteria: • Scalability • Flexibility-Extensibility • Integration with existing IT infrastructure • Information aggregation and filtering • Security of reserved information • Minimization of resource allocation • Customization
Scalability: A management tool must be designed in such a way that it provides the same or improved services as the information and computing resources grow and become distributed. • Flexibility-Extensibility: A security management tool must be capable to easily merge any changes to the corporate infrastructure.
Integration with existing information and technological infrastructure: A Security Management tool must be designed to coexist with pre-established technological investments of organization's management. • Information aggregation and filtering: Depending on the domain size the security administrator should be capable of deciding the aggregation and filtering level of the selected security information.
Security of reserved Information: Sensitive information should be collected and exchanged by security management system’s components. • Minimization of resource allocation: System that minimize the allocation of network resources required for its operation.
Customization: A Security Management system must provide the security administrator with the potential to customize the collected security related information according to organizational needs and expectations.
Conclusion: • The derived tool can be easily integrated with existing network management tools • Our security network management architecture guarantees scalability and extensibility. • Integration and authentication of information is guaranteed
References: • http://www.cisco.com/en/US/docs/internetworking/technology/handbook/NM-Basics.html • http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=740529 • http://ieeexplore.ieee.org/Xplore/login.jsp?url=/iel5/6648/17751/00820481.pdf?arnumber=820481