Outsourcing. There are a number of reasons why companies would want to outsource network security:

Authors Avatar

                                     Outsourcing Network Security

                         Research paper submitted in partial fulfillment for

                                                    INFO 634

                                              Jincy Sarah George

                                          Texas A & M University

                                                    Fall 2007


Introduction

Information is as significant as assets for businesses. Network and digital information can support the overall operation of any business and when they are compromised corporations can suffer grim financial consequences.  But is it really safe to surrender the network security perilously in the hands of an outsider?  This can be answered only if we understand the need for outsourcing and the pros and cons related to outsourcing. Also, this would also include all the IT regulations and knowledge about the different components of the network.

Outsourcing can be an option only if all the steps to it are planned well else it will prove to be a futile effort on the part of the organization.

 

Need for Outsourcing

There are a number of reasons why companies would want to outsource network security:


Challenges in technical expertise staff - In any business, ensuring network security is a 24X7 job. In addition to the system responsibilities, the staff needs to be constantly updated on understanding and shielding against the latest threats. This results in an ever increasing need for security staff accumulating to the budget of staff and related benefits. (Levine,2005)

Cost Savings - A comprehensive network security system demands staff with very specialized technical expertise, continuous training, software etc. Outsourcing offers cost savings as they are able to reduce the IT staffing as the need to update security arises. (Mears, 2004) Also, costs of managing the security service works out to be less than hiring in-house, full time security experts. For example a managed security service provider spend about $75,000 a year to monitor a 250 user computer network on a T1 (1.5 MBps) gateway excluding hardware. Replicating these in an organization produces similar hardware costs, plus at least $240,000 in annual compensation to hire three full time specialists” (Information Week Survey, 2002)

Service Reliability- Network security requires 24X7X365 staff and monitoring which is possible when it is being handled by the service providers. Also, there would be service level agreements signed with service providers allowing them to even out the price of the services against the level of services making sure that all the service deliverables are met. (Cisco Systems, 2002)


Network Security Services

Discussed below are some essential concepts  and components of network security:

Firewalls – A firewall is a protection planned against outside trespassers. They are often placed in between an Internet connection and an internal network.  A firewall can be hardware or software that performs packet filtering. What this means is that it is specialized software which examines incoming traffic and if it does not meet certain criteria of rules it is blocked. The firewall should be configured properly in agreement with the ever altering business and technology infrastructures (Albanese & Sonnenreich, 2004, pg. 224).

Managed Anti- virus protection – Known viruses and Trojan signatures are stored in Anti-virus software. The latest virus updates are installed by itself periodically and the software is effective if it is run all the time. It also has to be updated frequently which is a “tremendous security hog and is expensive” (Albanese & Sonnenreich, 2004, pg. 394). The organizations can reduce their concern about security as the service providers bring in antivirus protection to the entire network which eliminates the need for the organizations to worry about updating their security from time to (Cisco Systems, 2002).

Access Control Services – The two primary parts to access control is authentication and authorization (Stamp, 2006, pg. 153). Authentication relates to a method where the user tries to authenticate themselves to a machine and authenticated users are allowed access to a machine. Authorization deals with how the users try to authenticate themselves and if access is granted or not.

The three basic ways a user can be authenticated are:

Something you know – This deals with something the users know like passwords, social security numbers, etc.

Something you have - ATM card, Smart cards

Something you are – Deals with the field of biometrics like fingerprints and handwritten signatures, facial recognition, speech recognition etc

Join now!

Something the user knows does not cost much whereas the other two techniques would require the company to buy a smart card or a biometric device. It is the responsibility of the IT department to decide which technique to use taking into the account factors such as the company’s security philosophy and the cost.

Intrusion Detection Systems (IDS) – These security systems alert and warn the network administrators on unauthorized access. (Albanese & Sonnenreich, 2004, pg. 378) “Authentication can be viewed as a way to prevent intrusions and an example is firewalls” (Stamp, 2006) what will happen ...

This is a preview of the whole essay