Databases Reference
In-Depth Information
Internet
(on THE
“net”)
At Work
At
Home
On the Road
Exhibit 54-3. Where are your users?
can also be addressed. Concerns for multiple layering of controls and dis-
satisfied users with layers of security controls, passwords, hoops, etc. can
also be addressed (Exhibit 3).
WEB BROWSER SECURITY STRATEGIES
Ideally, Web browser security strategies should use a network-based secu-
rity architecture that integrates your company's external Internet and the
internal intranet security policies. Ensure that users on any platform, with
any browser, can access any system from any location if they are autho-
rized and have a “need-to-know.” Be careful not to adopt the latest evolving
security product from a new vendor or an old vendor capitalizing on a hot
marketplace.
Recognizing that the security environment is changing rapidly, and
knowing that we don't want to change our security strategy, architecture,
and control mechanisms every time a new product or solution emerges, we
need to take time and use precautions when devising browser security so-
lutions. It is sometimes a better strategy to stick with the vendors that you
have already invested in and negotiate with them to enhance their existing
products, or even contract with them to make product changes specific or
tailored to accommodate your individual company requirements. Be care-
ful in these negotiations as it is extremely likely that other companies have
the very same requirements. User groups can also form a common position
and interface to vendors for added clout and pressure.
You can basically secure your web server as much as or as little as you
wish with the current available security products and technologies. The
tradeoffs are obvious: cost, management, administrative requirements,
and time. Solutions can be hardware, software and personnel intensive.
Search WWH ::




Custom Search