Network security has become a major concern for businesses around the globe. Who Can Do Network Security?
Who Can Do Network Security?
Network security has become a major concern for businesses around the globe. Information systems and technology used within an organization must be protected from unauthorized access. This includes modification and destruction, both physically and electronically.
Information systems must maintain data integrity over information assets stored in these systems to ensure accuracy. System failures and improper shutdowns must be reported to IT or Security personnel immediately upon detection. But no later than 24 hours after the event occurrence.
So, that corrective action may be taken to prevent recurrence or mitigate its impact on an information system. That is before it causes damage or disruption to the operation of business processes of an information system owner. This includes authorized users or causes damage or disruption to the operations or business processes of other organizations using the same information system resource(s).
Audit Architects and Auditor’s Logs
Logs and audit trails are retained for a minimum period of five years from the date when the log was generated. However, they must be purged/ discarded as soon as they are no longer required to support security auditing. Since monitoring activities within ninety days unless they have been designated as critical logs/audit trails by IT Security.
Audit Architects /Auditors on account of any unusual event which has threatened (or may threaten) computer systems such that retention beyond ninety days is necessary for further investigation purposes. “No access” logs will be maintained for all privileged accounts with “no access” logs being generated every time a privileged account is accessed.
Such logs will be maintained for a period not less than two years from the date of log generation. In addition, audit trails may include the following. Similar to no access logs, archive logs are maintained for all privileged accounts.
Also, archive logs are generated on privileged accounts every time they are accessed. Hence, archive logs will be maintained for a period not less than two years from the date of log generation.
Who Can Do Network Security?
Risk Management is of the most important and complex tasks of any network security plan. Risk management is an ongoing process that must be carried on at all times. That is by the organization’s risk management team to ensure that security controls are adequate.
Evaluation of risks will involve the identification of assets, threats, and vulnerabilities. This is as well as an understanding of the cost/benefit of implementing security measures. Security is an ongoing process and it is necessary to transform system landscapes as technology changes.
Moreover, the organization’s security team will identify changes in business operations and emerging technologies. Also, this changes threats and vulnerabilities that emerge due to system weaknesses or possible attacks by unauthorized users. It is necessary for security professionals to constantly monitor their current systems for threats and vulnerabilities.
Network security is an integral part of an organization’s overall policy on information technology (IT) and information security. The IT Security Policy should include a statement on what actions are required. This is to protect the organization’s information assets from inappropriate access, modification, or destruction.