Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This document describes the information security methods used in networks comprised of Infinet Wireless devices. Each wireless device family has its own capabilities of application security tools, so at the end of a documents' section you will find links to the technical documentation of each described tool.

Terminology

  • Information - knowledges  knowledge about the world and the processes in it, perceived by a person or a special device.
  • Information Security (IS) - the security of the information and of the infrastructure components from against influences that may harm the subjects of information relations.
  • Technical company policy - a set of technical solutions necessary to use in the company technical systems. Technical policy includes requirements for installation, operation and configuration of devices. It is necessary to carry out periodical updates of the document and check its proper implementation.
  • Threat - potential violation of information security.
  • Attack - attempt to realize a threat. An attack can be either malicious or not.
  • Attacker - a person or group of people making an attack.
  • Echelon - a subject for attack preventing, implemented as a part of an information security policy.
  • Risk - the likelihood of a specific threat.
  • Responsibility area - a network segment which has a certain subject  responsible for its effective operation. A subject can be either a specific person or an organization.
  • internal network segment - a network segment that is in the responsibility area of our organization.
  • External network segment - a network segment that is under the responsibility of a third-party organization or client. Since the external network segment is managed by a third-party organization, the crossing of the internal and external network segments is a source of threats.

...