In general there are six (6) big step that may be used to secure the network & computer systems from hacker attacks. The steps are:
1. Making the Security Steering Committee.
2. Collecting Information
3. Calculating Risk
4. Creating Solutions
5. Implementation & Education / Education.
6. Analyzing Continuous, and Meresponds.
Step 1: Create a Security Steering Committee.
Steering committee is very important to set up a network security policy to be accepted by all parties. So no one is forced, feeling tortured, his access was restricted in operating in their Intranet network. With the included representatives from all fields / section, then the input from below can be expected to be signed & accepted by everyone.
With this steering committee, will allow interaction between the engineering / network administrators, users & managers. Can be searched so that the optimal policy that can be easily implemented technically.
Step 2: Collect Information
Before a network security policy implementation, it is better to complete the audit process carried out. Not only audit the network equipment & components, but also business processes, operating procedures, security awareness, asset. Of course, the audit process should be from the most high risk that the Internet; continue on the home user & VPN connection. Apart from the external audit, conducted an audit is a good idea from the internet such as HRD, etc..
Step 3: Calculating Risk
Risk in a simple formula can be described as:
Risk = Asset Value * Vurnerability * Likelihood of exploits
Value of assets including the value of money, because the system costs down, losing confidence in partners / customers. Including loss of data Vurnerability total / part, system downtime, damage / corruption of data.
By taking the results of the audit steps before, we need to ask:
• Is there a security policy is now sufficient to provide protection?
• Is an external audit work to validate the reliability of the existing security policy?
• Is there an audit process to detect weaknesses & not stated in the security policy?
• Is the security level, equivalent to the level of risk?
• What assets / information that has the highest risk?
By answering the above questions is a starting point for evaluating the completeness of the information policy we have. By evaluating the answers to the above, we can focus on solutions to its global macro & first caught on the solution without micro & individuals.
Step 4: Create Solution
On this day there are enough that its solution can be found plug'n'play in the market. Unfortunately, no single program / solution that works for all kinds of problems. Because we are intelligent we must choose from a variety of existing solutions for various security needs. Some of them, we know:
• Firewall.
• Network Intrusion Detection System (IDS).
• Host-based Intrusion Detection System (H-IDS).
• Application-based Intrusion Detection System (App-IDS).
• Anti-Virus Software.
• Virtual Private Network (VPN).
• Two Factor Authentication.
• Biometric.
• Smart cards.
• Server Auditing.
• Application Auditing.
• Etc. - there are still some more that are not included in the above categories.
Step 5: Implementation & Education / Education.
After all the support it gained in the implementation process can be done. The installation process will depend on the level of difficulty that must be faced. One thing you have in mind in all of the implementation process is a process of education / education should not be forgotten. This educational process must contain:
• Details of systems / new security procedures.
• Effek of the new security procedures for asset / company data.
• Explanation of procedures & how to meet the goals of the new security policy.
Participants must explain not only how / what security procedures are made, but also must explain why these security procedures will be undertaken.
Step 6: Analyzing Continuous, and Meresponds.
Evolving system, therefore the analysis of the procedures developed should always be done. Always in front, do not miss the train
Six (6) Step Securing Network & Computer Systems From Hacker Attacks
Label:
H4ck3R
Subscribe to:
Post Comments (Atom)
2 coment:
This is the right site for anybody who would like to understand
this topic. You realize so much its almost tough to argue with you (not
that I actually would want to…HaHa). You certainly put a new spin on
a topic that has been written about for years. Wonderful stuff, just great!
Also see my page :: Credit Repair Reviews
Been using AVG security for a couple of years, I would recommend this product to everybody.
Post a Comment
Please Leave a Comment...