top of page
Search

Secure Network Architecture

Writer's picture: Powell IT ServicesPowell IT Services

Hello,


There are several components that build a cybersecurity architecture so one that is secure is key. Some critical ones I will discuss in this discussion are physical security/controls, regulatory requirements and access controls.


Physical security in terms of cybersecurity is often overlooked. You can have the best, secure system money could buy but if anyone can walk in and access it, the purpose is defeated. You must provide secure sites for sensitive data and important objects with proper security protocols in place. Things such as a reinforced door, locks and cameras/alarms are examples of physical controls.


Regulatory requirements are there for the protection of the owner and user(s). This lays out rules for protecting user data, for example, such as HIPAA with patient records. There must be order or there will be chaos among data ownership and usage. Also, there are requirements required of the user(s) that, if not met, will not affect others or the owner(s).


Access controls allow only certain authorized individuals to access what is needed or allowed for their level of clearance, for example. This keeps important data out of the wrong hands and confidential if needed to be. The janitor should not be able to access the payroll, for example.


Best Regards,

Devin P.

2 views0 comments

Recent Posts

See All

Authentication

Hello, With it being the modern age and the constant advancements of technology, it is important to update/upgrade how we access our...

Secure Architecture

Hello, There are many flaws that are possible within secure architectures. In this discussion, I will describe three of the most common...

Cryptography

Hello Everyone, Cryptography has been around since the beginning of civilization. Caesars cipher was one of the earliest methods of...

Comments


bottom of page