What is Security Management in Information Security?

Information SecuritySafe & SecurityData Structure

Security Management for networks is different for all type of situations. A small home or an office would only need basic security while high businesses will need high maintenance and advanced software and hardware to avoid malicious attacks from hacking and spamming.

Small Homes

  • A basic firewall.

  • For Windows users, basic Anti-virus software such as McAfee, Norton AntiVirus or AVG Antivirus.

  • An anti-spyware program including Windows Defender or Spybot would also be a best concept. There are some types of antivirus or antispyware programs out there to be considered.

  • When utilizing a wireless connection, use a robust password. It can also use the strongest security provided by the wireless devices, such as WPA or WPA2.

Medium Businesses

  • An adequately strong firewall.

  • Strong Antivirus application and web security application.

  • For authentication, use strong passwords and change it on a monthly basis.

  • When utilizing a wireless connection, use a robust password.

  • Boost awareness about physical security to employees.

  • It can need an optional network analyzer or network monitor.

Large Businesses

  • A strong firewall and proxy to maintain unwanted person out.

  • A strong antivirus software package and internet security software package.

  • For authentication, use strong passwords and change it on a weekly basis.

  • When utilizing a wireless connection, use a robust password.

  • Exercise physical security precautions to employees.

  • It can prepare a network analyzer or network monitor and use it when required.

  • It can be implemented physical security management such as closed circuit television for entry areas and restricted areas.

  • Security fencing to indicate the company’s perimeter.

  • Fire extinguishers for fire-sensitive areas such as server rooms and security rooms.

  • Security guards can provide to maximize security.

School

  • An adjustable firewall and proxy to enable authorized users access from the external and internal.

  • Strong antivirus software and internet security software packages.

  • Wireless link that lead to firewalls.

  • Children’s Internet Protection Act compliance.

  • Supervision of network to security updates and changes based on famous site usage.

  • Constant project by teachers, librarians, and administrators to security preservation against attacks by both web and sneakernet sources.

Large Government

  • A strong firewall and proxy to maintain unwanted person out.

  • Strong Antivirus application and network Security application suites.

  • Strong encryption, frequently with a 256 bit key.

  • All network hardware is in secure areas.

  • All host must be on a private network that is invisible from the external.

  • Put all servers in a DMZ, or a firewall from the outside and from the internal.

  • Security fencing to indicate perimeter and set wireless range to this.

raja
Updated on 04-Mar-2022 10:41:15

Advertisements