||Internet security in an international company
||Sharp, Robin (Department of Informatics and Mathematical Modeling, Technical University of Denmark, DTU, DK-2800 Kgs. Lyngby, Denmark)
||Technical University of Denmark, DTU, DK-2800 Kgs. Lyngby, Denmark
||Enterprizes around the world have recognized the business potential of leveraging Internet technologies and the Internet itself. Many businesses are becoming increasingly reliant
on the Internet for communicating with customers, researching competitors and conducting e-commerce.
This increased use of the Internet, makes business networks become more vulnerable to Internet threats and attacks, emphasizing on the need to address new issues related to the technologies involved, especially in the area of Internet and Network Security.
These Internet Security attacks can wreak havoc on any business, leaving valuable data wiped out, confidential information stolen or corrupted, the entire network made inoperable, or access to sites vital to business operations shut down. The 2001 Computer
Crime and Security Survey, published by the Computer Security Institute, found that 85\$\backslash\$% of all companies on-line reported computer security breaches within the last year.
Despite all the security risks and even though there is a considerable corpus of knowledge about tools and techniques to protect networks, detailed information about what the actual
vulnerabilities are and how they are exploited, is not generally available. Therefore, only few organizations are taking sufficient measures to protect their networks and applications, leaving the chances of security problems impact every sector of their business
life to a maximum, and hampering the effectiveness of any kind of security research and practice.
The following master thesis identifies the security vulnerabilities that companies, in particular Plasdan, face if they go on-line without taking the necessary security measures and examines technologies and procedures that can systematically address those vulnerabilities. A detailed description and comparison on various features of the extracted solutions, will give a broad understanding on the detection and prevention
possibilities. Finally, a country dependent analysis, in combination with a proposition of multiple product possibilities from multiple known vendors, as part of an implementation, will
make the choice of deployment easier for the company.
||Department of Informatics and Mathematical Modeling, Technical University of Denmark, DTU : DK-2800 Kgs. Lyngby, Denmark
||Internet security; security policy; security strategies; security planning; OSI|Layer; PEST-analysis; VPN; IPSec
Creation date: 2006-06-22
Update date: 2012-12-19