Home > Articles > Security > Network Security

📄 Contents

  1. Planning for Security with Your ASP
  2. Your Data in Your Building vs. in a Network Operations Center
  • Print
  • + Share This

Your Data in Your Building vs. in a Network Operations Center

Whether your site is aimed at primarily selling products over your Web site or handling e-operations applications, the need for security increases with the potential for increased revenues and reduced costs. As the breadth of your e-business plans increase, so does the need for a robust security strategy in the context of an e-business approach that your organization is taking.

The levels of security vary by the types of activities that you are trying to accomplish. Table 1 compares various applications by the level of security needed.

Table 1: Comparing Typical Applications by Security Approaches Shows the Pervasive Role of Firewalls

Applications

Access Control

Firewall

Software Import Controls

Encryption

Incident Handling

Remote access

X

X

 

X

 

Electronic mail

   

X

X

 

Information publishing

X

X

     

Research

X

X

X

   

Electronic commerce

X

X

X

X

X

The fundamental question in working with an ASP is whether your organization has the security expertise to administer access controls, firewalls, software import controls, and encryption, as well as the ability to troubleshoot incidents. Clearly, if your organization also has remote access, there is a security issue for dial-in access being compromised. With many of the certification programs today focusing on security, system administrators in your organization may already be learning about firewalls and how to ensure encryption throughout your own complex of servers. IT organizations are increasingly either hiring security experts or getting their existing staffs up-to-speed on how to work with firewalls and complete incident handling. Skills for keeping your own data safe in your organization are increasingly focused on how to repel hacker attacks. International Data Corporation recently completed a survey of 1,000 technology companies and found that the majority of companies spend the majority of their time working to resolve or repel viruses on both workstations and servers.

In conclusion, developing security strategies for your online initiatives is critical for the success of your business. Being vigilant about turning security into a strength and alleviating losses electronically is what this section is focused on. Just as you have a marketing plan, be sure to pursue a security plan as well.

  • + Share This
  • 🔖 Save To Your Account

Related Resources

There are currently no related titles. Please check back later.