Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    How to Ensure Your Organization’s Network Is Safe From Intrusion

    By
    Chris Preimesberger
    -
    September 20, 2017
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1How to Ensure Your Organization’s Network Is Safe From Intrusion

      1 - How to Ensure Your Organization's Network Is Safe From Intrusion

      Establishing trust between the enterprise and its IT infrastructure is an essential part of security. Organizations must be confident that valuable data transmitted across a network is safe from theft and intrusion. This notion of trust implies the need for independent bodies to define what constitutes a secure solution. The National Institute of Standards and Technology (NIST), Common Criteria and ANSSI have established guidelines for all aspects of secure IT solutions, including hardware and software design, supply chain and process control. For the enterprise, trust is established through solutions that are evaluated by independent laboratories for compliance with these standards. In this eWEEK slide show, using industry information from Nokia security expert Chris Janson, we examine some of those criteria.

      2Security Is Trust

      2 - Security Is Trust

      A house is thought secure when its doors and windows are locked, protecting against intruders. The comfort of security comes through trust in the locks and integrity of the doors and windows. Security is based on the trust we place in mechanisms that protect something of value.

      3Encryption Is but One Segment of Data Security

      3 - Encryption Is but One Segment of Data Security

      Encryption is the most commonly used data protection mechanism in networks. But encryption alone is not enough: Strong keys, intrusion protection, standards-compliant trusted platforms and other elements are also essential.

      4AES-256: The Gold Standard of Encryption

      4 - AES-256: The Gold Standard of Encryption

      AES-256 is what you need to encrypt data in-flight. Developed in 1997, it has yet to be cracked and will provide excellent protection for years to come.

      5Key Strength and Quality Are Essential

      5 - Key Strength and Quality Are Essential

      Security is only as strong as its weakest link. High-quality and high-strength keys must be used to ensure maximum encryption strength and minimize danger of compromise as quantum computers become a viable threat.

      6Supply Chain Must Be Trustworthy

      6 - Supply Chain Must Be Trustworthy

      Hardware and software systems must come from trusted, reliable sources where controls are in place to avoid malware and malicious bugs. Beginning in the design phase and continuing through manufacture, delivery and operation, a trusted supply chain ensures process integrity.

      7What Are Crypto Certifications?

      7 - What Are Crypto Certifications?

      Building trust requires independent standards and testing for compliance to those standards. Several bodies have defined what is required of cryptographic modules, with specific needs varying by region.

      8FIPS 140-2

      8 - FIPS 140-2

      In the United States, NIST defines cryptographic requirements in its Federal Information Processing Standard 140-2 document. Four levels are defined, ranging from basic cipher algorithms to tamper-evident physical enclosures and automated response to unauthorized access.

      9CC EAL

      9 - CC EAL

      Common Criteria (CC) Evaluation Acceptance Level (EAL) is an international framework for IT security, developed cooperatively among several nations. CC EAL levels provide confidence grades that the system’s security features are reliably implemented.

      10ANSSI

      10 - ANSSI

      ANSSI is a French government agency that defines security standards to ensure integrity of data essential to national security. ANSSI is recognized as a leader in cyber-security standards within and beyond the European Union.

      11Trust but Verify Through Independent Certifications

      11 - Trust but Verify Through Independent Certifications

      Security solutions must be built upon trust with the vendors supplying them. Security features and compliance with independent standards should be verified through independent laboratory evaluation.

      PrevNext

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×