Information Technology Reference
In-Depth Information
table 9.15
oSi Model perspectie of lAn Security (Continued)
Layer 
No.
Layer Name
Description
Security Considerations
1
Physical
Cables, network interface cards
(NICs), electrical signals, hubs,
repeaters, wireless signals
Physical access to cables, wiring
closets, demark points from
external services; wiretapping
(confidentiality), destruction
(availability), man in the
middle (integrity)
table 9.16 Applied iA 2 Summary: lAns
IA 2  Topic
Description
Mechanism
LAN security mechanisms; a variety applied as defense-in-
depth, including firewalls, anti-malware, access control lists
(ACLs) to components, traffic routing rules, IDS, OS
security, etc.
Drivers
Business and technical drivers span the range of process,
organization, location, data, application, and technology.
IA 2 view
Applicable IA 2 views: People, policy, business process,
systems and applications, information/data, infrastructure
(technical, physical)
IA core principles
Applicable IA core principles:
Confidentiality-integrity-availability (CIA)
Possession-authenticity-utility (PAU)
Privacy-authorized use-nonrepudiation (PAN)
Compliance
requirements
Legislative, policy, guidelines, government directives, or
other requirements specifically calling out or implying the
need to protect information and information technology
ELCM application
Applicable ELCM elements: Concept, architect, engineer,
develop/acquire, implement, test, deploy, train, O&M, retire
Verification
Formal C&A; integration testing; service aggregation testing
(defense-in-depth)
Operations
Applicable IA operations cycle phases: Anticipate, defend,
monitor, respond
 
Search WWH ::




Custom Search