Tip

The Security Review Process

Written by Juanita Ellis; Published by Elsevier Science

This excerpt is from Chapter 2, The Security Review Process, of Internet Security: A Jumpstart for Systems Managers and IT Managers written by Juanita Ellis and published by Elsevier Science.


It is 1860, and you are the bank manager. Your number-one goal is to keep the money safe. What steps will you take to keep the money from the men in the black hats? Some of these steps may be to understand how the bank will be robbed:

  • Will the robbers enter by the front door?
  • Will they enter by the back door?
  • Will they try to use explosives on the safe?
  • Will they use social engineering to get the money? "Joe sent me down to get his money. Give it to me and I will give it to him in the bar."
  • Will they try to use someone on the inside to help get the money?

Next, the manager will determine what steps are needed to keep the bad guys out:

  • Use a safe with a combination lock.
  • Put bars on the door.
  • Get a security guard -- hire a gun slinger.
  • Keep a gun and use it if needed.
  • Train employees how to keep the money safe.
  • And, most important, make sure that the bank manager knows the sheriff.

You will need to take similar action as the owner and/or manager of your network infrastructure. Using the following five steps will get you started with your security review:

  1. Start by reviewing the current state of the business.
  2. Analyze the technology currently being used.
  3. Start a

    Requires Free Membership to View

  1. risk analysis process.
  2. Create the plans.
  3. Begin your security implementation process.

Each step will link into a succeeding step. This approach should be used for each process or department within the business, as well as for the holistic enterprise.

>> Read the rest of Chapter 2, The Security Review Process.


Also on our virtual bookshelf, check out...


This was first published in June 2003

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.