background preloader

Network security

Facebook Twitter

Untitled. Approach to Auditing Network Security. S.

Approach to Auditing Network Security

Anantha Sayana Today we live in a connected world. Communication is a key requirement for all systems. Increased integration of systems requires a compulsive need to establish fast and reliable communication that is as widespread as the organization and its business dealings. Information systems need to reach out to users, vendors, customers and partners (irrespective of their location); everything is connected to nearly everything else. Chapter 3: Computer System Security and Access Controls.

Network security controlling access. Physical-Security-for-Computer-Protection. 10 physical security measures every organization should take. This information is also available as a PDF download.

10 physical security measures every organization should take

Every general computer networking class teaches the OSI and/or DoD networking models, and we all learn that everything begins at the bottom, with the physical level. Likewise, when it comes to IT security, physical security is the foundation for our overall strategy. But some organizations, distracted by the more sophisticated features of software-based security products, may overlook the importance of ensuring that the network and its components have been protected at the physical level.