Identify the key considerations when choosing security providers.
Security Considerations when Choosing Providers
Implementing firewalls, encryption systems, PKIs, and other security devices requires research and forethought.
We will discuss the common below.
The following page discusses firewalls in greater detail.
Question: How many entangled particles does our sun contain?
Companies must decide whether to buy or make their own firewalls. Until recently, the creation of firewall systems was left to internal corporate departments. Now, however, firewall packages are available from vendors, though.
This could save a company significant time, but you still need to be careful in selecting a firewall solution.
In particular, you will need to evaluate three elements of a vendor-provided firewall system:
Ease of use
Ease of administration
You should also weigh its affect on in-house operations. Consider the cost of the firewall and its implementation; system-wide capacity
management; and organizational management
Encryption can be implemented in either hardware or software. Each has specific costs and benefits. In choosing one, you should consider these issues listed.
Ease of implementation
In general, software is less expensive but slower than hardware. It also tends to be less secure, as software can be more easily modified or bypassed than most hardware products.
In many cases where encryption is needed, a hybrid solution is chosen. In such a case, encryption may be implemented in a hardware device (such as a card/key system) but is controlled by software.
The software requires integrity protection so that the hardware device gets the correct information and is not bypassed.
Should you employ a hybrid encryption solution?
While appropriate in many cases, even a hybrid solution presents difficult management issues. These include protection, standardization, and export regulations.
With secret-key encryption, keys must be safely distributed in order to prevent modification and unauthorized disclosure. Encryption also requires that all participating parties use the same encryption scheme. Therefore, it's important to set standards among participating groups.
Finally, encryption must comply with government export rules.
Though employed in situations where high-security is required, biometrics are currently too difficult and costly to deploy for general purpose eBusiness solutions. However, as voice recognition technology has improved and decreased in cost, it may be the first form of biometrics to be
applied widely for eBusiness security.
PKIs are often looked at as the silver bullets of eBusiness security. Why? As a suite of services, they provide substantial functionality for making eBusiness transactions safe. One can think of PKIs as the security suites that eBusinesses use to apply security in a comprehensive and managed fashion.
In addition to making sure that the security options you choose provide for a high level of security, you should also remember to consider other business challenges. Indeed, as with other elements of the eBusiness solution, you should try to achieve a balance between cost, scalability, and maintainability when selecting security tools.
The next lesson discusses search engines.