Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Tip
titleSecurity measures implementation for data transfer
Expand
titleMeasures list
Center

Security Implementation of the security measures implementation for data transfer 

Anchor
infrastructure
infrastructure
Infrastructure

Infrastructure The infrastructure security is the important section of an important aspect concerning the information security, which needs a requires special attention.  Infrastructure character The infrastructure implementation depends on the technical policy of the enterprise. The network should contain have functionalities such as logging, monitoring and technical record-keeping.

...

Monitoring systems can be integrated with alarm systems and video surveillance.

Infinet company provides its own system for monitoring the Infinet wireless devices - InfiMONITOR. The monitoring system collects data in the following ways (Figure 16):

  • Polling: the monitoring system sends SNMP requests to the device devices, demanding the specific parameters whose values must be received. The device generates an SNMP response for the monitoring system, where it indicates the values of the requested parameters.  Device parameters The device parameter polling is carried out with a set periodicity, which guarantees that each device will be requested interrogated in a given interval.
  • Traps: the device sends a special SNMP Trap message to the monitoring server in case of an incident from the specified list.  SNMP The SNMP Trap sending is initiated by the device itself and occurs instantly, regardless of the polling cycle, however, this will require additional device configuration.

...

A detailed incident investigation requires an analysis of the system logs stored on the device. Infinet devices support logging, but the system log will be lost after a device reboot. In large networks it is useful to have a centralized repository of log files, such . Such a repository has an interface which allows to display all the network's devices logs used in necessary for the incident investigation.

A Syslog server is allocated on the network for these purposes. All log entries are sent to the Syslog server simultaneously with writing to the system log (Figure 17). This allows to centrally store the message history of all the network devices message history centrally , without the risk to lose of losing all syslog data in case of device reboot or unauthorized access.

...

Operational problems solving, to gain access to the facility, to restore the configuration , and add it to the monitoring system, etc requires a comprehensive information about the devices. Such information includes both technical and administrative aspects. Special technical record-keeping systems can be used on the network to store the data and have access to it. Technical record-keeping systems contain the following information:

  • Device info: indicates the device model, its serial number and network details.
  • Site info: indicates the device location, information about access to the site, contact information, etc.
  • Text device configuration: The the device configurations 's configuration history can be used for the during incident investigation and for device operation restorerestoring, therefore, configurations configuration backups should be performed regularly. Some technical record-keeping systems can be joined with systems of mass devices configuration on the network: such systems allow to unifiy devices configurations, unify the configuration of the devices and the network is assumed seen as a single device for which the history of changes is stored.

...