Security Architecture Design
Security architecture is an important aspect of any security system safeguarding an organizations data, employee/client demographic information and many other vital data. Deployment of an effective scalable network security system requires proper design according to the risk analysis and employing security principles in best practices and maintaining a satisfactory level of compliance. www.disa.mil/.../mil
Should any of the key ...view middle of the document...
These all bear on the security infrastructure and the ability to defend mitigate and prevent an attack. Any deviation from the security protocols makes the system weak and a viable target for attacks and hacks. Keep in mind that these attack can be generated from outside and from inside the organization. An employee that has been terminated or is disgruntled can be a grave threat to the compromised system as they have a good working knowledge of the system and the weaknesses that are exploitable. The compromised security infrastructure is vulnerable to many threats that under specific circumstances can potentially lead to loss or damage to the infrastructure and/or the data, transfer of sensitive demographic information protected under HIPPA or many other federal and US Codes and laws. These are but a few of the tremendous risks that are serious issues for the compromised security infrastructure.
(Randy weaver, 2014)
I find, though few of my peers have posted their papers that I do tend to agree with many of the points that have been expressed. I do not see any dramatic errors in the manner of critical logic employed by my classmates.
Permissive restrictive policies are an outstanding means of securing a system as they control both personnel and firewall configurations along with other elements of the security infrastructure. The policies, when well-planned and written are formidable obstacles to many threats and prevent many from...