Search GSSD

Building A Strong Foundation: How Network Architecture Dictates IT Security

Abstract: 
In recent years, internet architecture security has become a crucial goal of developers. Traditionally, companies have focused on protecting user-side systems, however, while protecting data should be the first priority, as most cyber attackers attempt to breach data centers. In order to protect data, companies should follow the principles of segmentation, the separation of security zones in company infrastructure, lateral movement, the monitoring of horizontal data flows, legacy management, the restrictive usage of legacy applications, and server provisioning, the careful lockdown of all unnecessary potential access points. It is also important to account for the human element in cybersecurity, following the principles of standardizing the desktop image organization-wide, utilizing cloud computing services where possible, enforcing tighter authentication standards, and monitoring privileges. Before investing great amounts of money in security, companies should focus on implementing these points in their operations.
Author: 
Jeffery Schilling
Institution: 
Forbes
Year: 
2017
Domains-Issue Area: 
Dimensions-Problem/Solution: 
Region(s): 
Industry Focus: 
Internet & Cyberspace
Datatype(s): 
Policies