By Sowmya.Y. Index  Definition  Aspects of Security Management  Assessment criteria for designing Security Management System  Conclusion  References.

Slides:



Advertisements
Similar presentations
2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
First create and sign up for a blue host account Through the help of Blue Host create a WordPress website for the business After you created WordPress.
Guide to Network Defense and Countermeasures Second Edition
Auditing Corporate Information Security John R. Robles Tuesday, November 1, Tel:
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
Overview of the technology that comprises Attendance Enterprise.
Security Controls – What Works
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
1 PUNCH PUNCH (Purdue University Network Computing Hubs) is a distributed network-computing infrastructure that allows geographically dispersed users to.
Distributed Application Management Using PLuSH Jeannie Albrecht, Christopher Tuttle, Alex C. Snoeren, and Amin Vahdat UC San Diego CSE {jalbrecht, ctuttle,
Mobile Agents: A Key for Effective Pervasive Computing Roberto Speicys Cardoso & Fabio Kon University of São Paulo - Brazil.
1 Introduction to: Information systems architectures and infrastructures.
Chapter 10 Managing the Delivery of Information Services.
The Open Grid Service Architecture (OGSA) Standard for Grid Computing Prepared by: Haoliang Robin Yu.
Business Intelligence Dr. Mahdi Esmaeili 1. Technical Infrastructure Evaluation Hardware Network Middleware Database Management Systems Tools and Standards.
Chapter 8: Network Operating Systems and Windows Server 2003-Based Networking Network+ Guide to Networks Third Edition.
(Re)Designing Software Production Architectures Walt Scacchi ATRIUM Laboratory and USC Center for Software Engineering 10.
The 10 Deadly Sins of Information Security Management
Dagstuhl, February 16, 2009 Layers in Grids Uwe Schwiegelshohn 17. Februar 2009 Layers in Grids.
WORKFLOWS IN CLOUD COMPUTING. CLOUD COMPUTING  Delivering applications or services in on-demand environment  Hundreds of thousands of users / applications.
Understanding Active Directory
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Overview of Enterprise Computing: The Business View.
By N.Gopinath AP/CSE. Why a Data Warehouse Application – Business Perspectives  There are several reasons why organizations consider Data Warehousing.
A Human-centric framework for universal access Canadian Undergraduate Software Engineering Conference March 7-9, 2002 Jacob Slonim Dalhousie.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Chinese-European Workshop on Digital Preservation, Beijing July 14 – Network of Expertise in Digital Preservation 1 Trusted Digital Repositories,
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Thirteenth Lecture Hour 8:30 – 9:20 am, Sunday, September 16 Software Management Disciplines Process Automation (from Part III, Chapter 12 of Royce’ book)
Distributed Systems 1 CS- 492 Distributed system & Parallel Processing Sunday: 2/4/1435 (8 – 11 ) Lecture (1) Introduction to distributed system and models.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
Assignment 2 Project: Sea Urchin Sporting Goods Team Members: Gwn Hannay, Debbie Carlton, Susan Dalgleish Daniel Barnes, David Cooper.
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved BUSINESS PLUG-IN B17 Organizational Architecture Trends.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
1 OSG Accounting Service Requirements Matteo Melani SLAC for the OSG Accounting Activity.
Copyright 2014 Open Networking User Group. All Rights Reserved Confidential Not For Distribution Six Steps To A Common Open Networking Ecosystem Common.
Active Directory Overview n Course: Operating System n Professor: Mort Anvari n Student: Lina Si n Date: 09/07/02.
Engineering Essential Characteristics Security Engineering Process Overview.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
思科网络技术学院理事会. 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Chapter 5 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
1 BRUSSELS - 14 July 2003 Full Security Support in a heterogeneous mobile GRID testbed for wireless extensions to the.
1 Makes Mobile WiMAX Simple Netspan Overview Andy Hobbs Director, Product Management 5 th October 2007.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
Marv Adams Chief Information Officer November 29, 2001.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Chapter 4 Intranets and Extranets. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Copyright © 2012, SAS Institute Inc. All rights reserved. SAS GRID OPUS SPRING 2014 MEETING FRANK SCOTT, SAS CANADA.
Library Online Resource Analysis (LORA) System Introduction Electronic information resources and databases have become an essential part of library collections.
Windows NT ® Security Management: Extending Windows NT 5.0 Security Management Tools, Part 2 Praerit Garg Program Manager Windows NT Security Microsoft.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Cyber Security in Smart Grids BY ADITYA KANDULA DEVASIA THOMAS.
© ITT Educational Services, Inc. All rights reserved. IS3120 Network Communications Infrastructure Unit 10 Network Management—FCAPS.
AMSA TO 4 Advanced Technology for Sensor Clouds 09 May 2012 Anabas Inc. Indiana University.
1 The XMSF Profile Overlay to the FEDEP Dr. Katherine L. Morse, SAIC Mr. Robert Lutz, JHU APL
Managing the Delivery of Information Services
Engagement Close-Out Workshop
Grid Computing B.Ramamurthy 9/22/2018 B.Ramamurthy.
DEPLOYING SECURITY CONFIGURATION
How to build an Internet Service
Presentation transcript:

By Sowmya.Y

Index  Definition  Aspects of Security Management  Assessment criteria for designing Security Management System  Conclusion  References

ISO has defined five key functional areas of network management:  fault management  accounting management  configuration management  performance management  security management

Security Management: Security Management is the process of controlling the security of a complex data network so as to maximize the security level that provides to its users.

Aspects of Security Management:  Security Management is one of the five management functions defined by ISO/OSI, which covers two aspects:  Management of Security(MoS)  Security of Management(SoM)

Management of Security(MoS):  MoS(Management of Security) provides the means by which the security services, mechanisms and security related information are managed.

Security of Management(SoM):  SoM(Security of Management) covers security of all functions and security of communication of management system and information.

Assessment Criteria:  Scalability  Flexibility-Extensibility  Integration with existing IT infrastructure  Information aggregation and filtering  Security of reserved information  Minimization of resource allocation  Customization

 Scalability: A management tool must be designed in such a way that it provides the same or improved services as the information and computing resources grow and become distributed.  Flexibility-Extensibility: A security management tool must be capable to easily merge any changes to the corporate infrastructure.

 Integration with existing information and technological infrastructure : A Security Management tool must be designed to coexist with pre- established technological investments of organization's management.  Information aggregation and filtering : Depending on the domain size the security administrator should be capable of deciding the aggregation and filtering level of the selected security information.

 Security of reserved Information: Sensitive information should be collected and exchanged by security management system’s components.  Minimization of resource allocation : System that minimize the allocation of network resources required for its operation.

 Customization : A Security Management system must provide the security administrator with the potential to customize the collected security related information according to organizational needs and expectations.

Conclusion:  The derived tool can be easily integrated with existing network management tools  Our security network management architecture guarantees scalability and extensibility.  Integration and authentication of information is guaranteed

References:  orking/technology/handbook/NM- Basics.html orking/technology/handbook/NM- Basics.html  arnumber= arnumber=  =/iel5/6648/17751/ pdf?arnumber= =/iel5/6648/17751/ pdf?arnumber=

Q & A

Thank You!!