Network Security Basics
by Steven Taylor and Larry Hettick

 

Abstract:

 

Company information is as valuable a company asset as money in the bank. In fact, some information can be even more valuable than cash. So protecting the company’s information with appropriate security is critical to business success. This backgrounder will provide a basic introduction to data and network security; however, it is only intended as an introductory primer so business owners and managers can begin to understand the complexity of managing security.

 

Security exists on many layers. Network security considerations begin with (but are not limited to) a range of considerations including:

 

bullet

how company office facilities are selected and maintained,

bullet

how potential employees are screened,

bullet

the remote access policy to the company’s systems and information, and

bullet

what kind of encryption and firewalls are provided in the corporate network.

 

Best-practice security isn’t just good business - in some cases, it’s also the law. And the legal requirements are different for specific industries and between different jurisdictions. For example, the Health Insurance Portability and Accountability Act (HIPAA) sets requirements for patient privacy in the United States. In California, privacy laws prohibit financial institutions from sharing personal financial information with unaffiliated third party partners without the consumer’s consent. And in Europe, privacy laws protect certain employee information—even to the point where inappropriately sharing an employee’s name and location in a company directory can be considered a violation.

 

So when considering security, it is important to consider business policy and practices, legal requirements, and technology. This technology backgrounder will introduce some of the technical aspects to consider in network security, with a particular focus on network security for small and medium-sized business.

 

bullet

Download paper
bullet

Approx. 211 kB

bullet

Click here for help with .pdf downloads. 

bullet

Related Presentation: Network Security Fundamentals

bullet

Return to Communications 101 Webtorials menu

 

About the Authors:

 

Steven Taylor is president of Distributed Networking Associates and publisher/editor-in-chief of Webtorials.

 

Larry Hettick is Vice President, Wireline Solutions at Current Analysis.

 

 

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.