Security Basics mailing list archives
Re: security architecture
From: Hollis Johnson <hollis () cisco com>
Date: Tue, 17 Feb 2004 19:10:35 -0800
Gery, I don't have a pix offhand, but I certainly have seen many. I'm sure someone out there has a good pointer.
I always like to start with a "war story". I was reading Graff & van Wyk on the airplane yesterday and they had a war story on the Code Red virus where the IT team secured all the production servers tightly and stopped at their "scope of responsibility" That meant not employee equipment -- and the Code Red virus snuck in via the employee equipment then migrated to the production fleet. Seems to relate well to an IT group... I'm certain you could find something like this one which is appropriate.
Whether your IT staff is on board or not, a good war story nails home that "security is everyone's responsibility".
Depending on your audience do you- Want to convince them that a focus on security is important? A few war stories, then some basic recommendations. - Want to give them specific recommendations and areas of focus? War stories and the fixes/circumventions -- start them thinking. - Already well security-aware.. What are the areas they should focus on. Any new tools, techniques. Interesting new products which might pique their interest??
Those are my recommendations, albeit very hi level. Might help -- or maybe not :-,
Good Luck. 70 IT staff is sometimes a Very Tough audience.. At 09:12 AM 2/16/2004 +0100, Nagy Gergely wrote:
Hi all, Thanks for all the comments on my previous "security presentation" topic. I have the following audience: our IT group with 70 employees. Another issue: do you have any good picture or some drawing about very general security architecture and how they connect with each other? I mean: DMZ, Firewall, IDS, routers, VPN etc. Do you have some ideas? Gery Ez a level virusellenorzesen esett at! This message was checked against viruses! --------------------------------------------------------------------------- Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection Protect your network with the comprehensive security solution that integrates six applications for ease of use and lower TCO. Firewall - Virus protection - Spam protection - URL blocking - VPN - Wireless security. Download 30-day evaluation at: http://www.astaro.com/php/contact/securityfocus.php ----------------------------------------------------------------------------
--------------------------------------------------------------------------- Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection Protect your network with the comprehensive security solution that integrates six applications for ease of use and lower TCO. Firewall - Virus protection - Spam protection - URL blocking - VPN - Wireless security. Download 30-day evaluation at: http://www.astaro.com/php/contact/securityfocus.php ----------------------------------------------------------------------------
Current thread:
- iptables Jorge Garcia (Feb 12)
- RE: iptables Joey Peloquin (Feb 12)
- proving a wireless router is shared/open Steve (Feb 13)
- Re: proving a wireless router is shared/open JGrimshaw (Feb 13)
- security architecture Nagy Gergely (Feb 16)
- Re: security architecture Hollis Johnson (Feb 18)
- proving a wireless router is shared/open Steve (Feb 13)
- Re: proving a wireless router is shared/open phaseone (Feb 16)
- RE: proving a wireless router is shared/open dave kleiman (Feb 16)
- Re: proving a wireless router is shared/open JM (Feb 16)
- RE: iptables Joey Peloquin (Feb 12)
- <Possible follow-ups>
- RE: iptables Mike (Feb 12)
- RE: iptables Shawn Jackson (Feb 13)