Logical/Technical Security Controls - Part 3
In this final installment in the access controls series, I examine ways to manage who and what obtain access to networks from locations outside the …
Continue ReadingIn this final installment in the access controls series, I examine ways to manage who and what obtain access to networks from locations outside the …
Continue ReadingIn Part 1, I discussed controls for preventing physical access to controlled areas. In this article, we look at detective controls, safeguards to …
Continue ReadingIn this series, I examine the preventive and detective capabilities of various types of physical security controls, including biometrics, fences, …
Continue ReadingIn Part 1 of this two part series, I examined administrative controls that help prevent security incidents. In this article, I conclude our look at …
Continue ReadingThe use of thin clients (for server-based computing) is the way of the future: the not so distant future. As technology in this field gets better, …
Continue ReadingAccess controls prevent unauthorized people from viewing or stealing information assets and employees from accessing sensitive information and systems …
Continue ReadingPolicies are the heart of a security program. They are management’s statement of support and expected outcomes from security controls. In this …
Continue ReadingThe framework around which administrative, technical, and physical controls are built is the security program. This article walks through building a …
Continue ReadingWindows XP has been working fine, but Microsoft just released SP 3. Should you install it at your small business? What are the benefits? Risks? …
Continue ReadingUser awareness is an essential part of information security. The existence of policies, standards, and guidelines must be known to the employees that …
Continue ReadingIn the previous article, we examined the layers in the JES defense-in-depth approach to network security. In this closing article, we put all the …
Continue ReadingProtecting sensitive information and critical systems is a balancing act, balancing constraints with operational effectiveness. This is the first in …
Continue Reading