{"title":"Challenges affecting a defense-in-depth security architected network by allowing operations of wireless access points (WAPs)","authors":"G. Suarez","doi":"10.1109/SAINTW.2003.1210187","DOIUrl":null,"url":null,"abstract":"Many corporations and government organizations spend millions of dollars in the protection of their company or organizational data. These protection mechanisms often follow a secured layered approach, called defense in depth (DiD), which allow these organizations to have a more secured network based on security mechanisms at different areas of their network design. Defense in depth is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack. Because there are so many potential attackers with such a wide variety of attack methods available, there is no single method for successfully protecting a computer network. Utilizing the strategy of defense in depth will reduce the risk of having a successful-and likely very costly-attack on a network. In today's environment there is more of a need than ever for increased security in enterprise level networks. Companies are finding themselves with offices around the world and needing a way to provide an affordable high speed secure communications between them as well as provide ways to implement wireless technologies in a secured environment. This paper describes an example of how this can be done and the special issues and challenges associated with securing these types of networks.","PeriodicalId":131526,"journal":{"name":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAINTW.2003.1210187","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Many corporations and government organizations spend millions of dollars in the protection of their company or organizational data. These protection mechanisms often follow a secured layered approach, called defense in depth (DiD), which allow these organizations to have a more secured network based on security mechanisms at different areas of their network design. Defense in depth is the concept of protecting a computer network with a series of defensive mechanisms such that if one mechanism fails, another will already be in place to thwart an attack. Because there are so many potential attackers with such a wide variety of attack methods available, there is no single method for successfully protecting a computer network. Utilizing the strategy of defense in depth will reduce the risk of having a successful-and likely very costly-attack on a network. In today's environment there is more of a need than ever for increased security in enterprise level networks. Companies are finding themselves with offices around the world and needing a way to provide an affordable high speed secure communications between them as well as provide ways to implement wireless technologies in a secured environment. This paper describes an example of how this can be done and the special issues and challenges associated with securing these types of networks.