Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of

...

contents

Table of Contents
excludeСписок документов|Содержание

...

The information technology evolution has changed a the human life in all spheres, making information one of the most valuable resources. Same as other resources, information is valuable for its owner and can cause disputes and conflicts. That's why, the information security issue should be taken seriously enoughinto account. The information systems development and the large amounts of data accumulation made necessary require an integrated approach to in ensuring the security of the technical systems security.

The This document describes the information security tools methods used in networks built using comprised of Infinet Wireless devices. Each wireless devices device family has its own capabilities of application security tools, so at the end of a document documents' section you will find links to the technical documentation for of each of the described toolstool.

Terminology

  • Information - knowledges about the world and the processes in it, perceived by a person or a special device.
  • Information Security (IS) - the security of information and infrastructure components from influences that may harm the subjects of information relations.
  • Technical company policy - a set of technical solutions necessary to use in the company technical systems. Technical policy includes requirements for installation, operation and configuration of devices. It is necessary to carry out periodical updates of the document and check its proper implementation.
  • Threat - potential violation of information security.
  • Attack - attempt to realize a threat. An attack can be either malicious or not.
  • Attacker - a person or group of people making an attack.
  • Echelon - a subject for attack preventing, implemented as a part of an information security policy.
  • Risk - the likelihood of a specific threat.
  • Responsibility area - a network segment which has a certain subject  responsible for its effective operation. A subject can be either a specific person or an organization.
  • internal network segment - a network segment that is in the responsibility area of our organization.
  • External network segment - a network segment that is under the responsibility of a third-party organization or client. Since the external network segment is managed by a third-party organization, the crossing of the internal and external network segments is a source of threats.

...