By Sowmya.Y
Index Definition Aspects of Security Management Assessment criteria for designing Security Management System Conclusion References
ISO has defined five key functional areas of network management: fault management accounting management configuration management performance management security management
Security Management: Security Management is the process of controlling the security of a complex data network so as to maximize the security level that provides to its users.
Aspects of Security Management: Security Management is one of the five management functions defined by ISO/OSI, which covers two aspects: Management of Security(MoS) Security of Management(SoM)
Management of Security(MoS): MoS(Management of Security) provides the means by which the security services, mechanisms and security related information are managed.
Security of Management(SoM): SoM(Security of Management) covers security of all functions and security of communication of management system and information.
Assessment Criteria: Scalability Flexibility-Extensibility Integration with existing IT infrastructure Information aggregation and filtering Security of reserved information Minimization of resource allocation Customization
Scalability: A management tool must be designed in such a way that it provides the same or improved services as the information and computing resources grow and become distributed. Flexibility-Extensibility: A security management tool must be capable to easily merge any changes to the corporate infrastructure.
Integration with existing information and technological infrastructure : A Security Management tool must be designed to coexist with pre- established technological investments of organization's management. Information aggregation and filtering : Depending on the domain size the security administrator should be capable of deciding the aggregation and filtering level of the selected security information.
Security of reserved Information: Sensitive information should be collected and exchanged by security management system’s components. Minimization of resource allocation : System that minimize the allocation of network resources required for its operation.
Customization : A Security Management system must provide the security administrator with the potential to customize the collected security related information according to organizational needs and expectations.
Conclusion: The derived tool can be easily integrated with existing network management tools Our security network management architecture guarantees scalability and extensibility. Integration and authentication of information is guaranteed
References: orking/technology/handbook/NM- Basics.html orking/technology/handbook/NM- Basics.html arnumber= arnumber= =/iel5/6648/17751/ pdf?arnumber= =/iel5/6648/17751/ pdf?arnumber=
Q & A
Thank You!!