Solution to Intranet network security (1)

Source: Internet
Author: User

This article briefly analyzes the main analysis of the internal network of the enterprise, and expounds the main technical countermeasures of security management personnel for different threats. This article further introduces the status quo of various technical measures in the industry and proposes possible future development trends.

Proposal of Intranet network security issues

Network Security is Internet Security for the vast majority of people, but not for the organization's Security director. Their mission is to protect enterprises' digital assets-information and infrastructure. For these protected objects, they may be external sources of risk, however, the external risk source may be Internet or Intranet. The internal network is not the same as the trusted network. For an organization, internal threats may be far greater than external threats. This makes it necessary to conduct targeted analysis on Intranet network security and find a solution.

Intranet Network Security Risk Analysis

Analysis perspective

Network security is a very complex and huge research object. Different research perspectives may "see" different security risks. For example, for a single digital asset, the most common view is its integrity, confidentiality, and availability. The security architecture of an organization can be analyzed from the perspective of the physical layer, network layer, data layer, and user layer. For the purpose of simplification, this article analyzes the security of internal networks by their participants, including networks, communication parties and information. The model analyzed in this article is the security risks faced by the communication parties in different networks during the information exchange process.

Security risks

According to this model, the main risks to be concerned are:

◆ Network

If the Organization has well planned and managed its internal network, different networks mean that they are in different internal departments and/or different security levels. The main risks include: different departments may not access resources across networks; communications between different security levels may contain potential attacks.

◆ Contact

Both parties involved in communication need to protect the security of the server. Because the server often takes necessary security measures, the security of the client side becomes a shortcoming in the barrel theory.

◆ Information Exchange

The purpose of communication is to exchange information. For security administrators outside the communication party, they mainly focus on the exchanged content and possible security risks in the communication mode. The main risks are: communication content that does not conform to the enterprise's security policy mainly refers to files); communication methods that do not comply with the enterprise's security policy should not communicate or occupy bandwidth ).


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.