You are here

Information Security: Securing a Network Device with Passwords to Protect Information

Journal Name:

Publication Year:

Abstract (2. Language): 
Information security is a complex and critical subject, conventionally only tackled by well-trained and experienced professionals. The importance of an effective password policy at the device level is obvious and often entire networks can be brought down due to the lack of simple password security on a single device. Typically, there are numerous devices on a network but the router is at the heart of any network which connects Local Area Networks (LANs) to the outside world (Internet). The Internet is essentially a collection of different Internet Service Providers (ISPs) and routers using Border Gateway Protocol (BGP) providing connectivity between different ISPs around the globe. The Internet is expanding at an enormous speed and secure exchange of information is needed by organisations and individuals alike. This paper emphasises the need for an effective device-level password security as an essential component of a more comprehensive organisational security policy. As an illustration, a practical implementation of effective password security is carried out using one of the most widely deployed routers in the industry.
62-76

REFERENCES

References: 

Bellovin, S. (1989, April). Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, 19 (2), 32-48.
Business Software Alliance. (2002). Information Security Governance: Toward a Framework for Action. Retrieved April 29, 2009 from
http://www.bsa.org/country/Research%20and%20Statistics/~/media/BD05BC8FF...
Harkins, D., & Doraswamy, N. (1999). IPSec: The new security standard for the Internet, intranets, and virtual private networks. NJ: Prentice Hall.
Windowsecurity.com. (2008, December, 03). Writing an Effective Security Policy. Retrieved April 20, 2009 from
http://www.windowsecurity.com/articles/Writing-Effective-Security-Policy...
Windowsecurity.com. (2008, December, 17). Writing an Effective Security Policy. Retrieved April 20, 2009 from
http://www.windowsecurity.com/articles/Writing-Effective-Security-Policy...

Thank you for copying data from http://www.arastirmax.com