- Planning for Security with Your ASP
- Your Data in Your Building vs. in a Network Operations Center
Your Data in Your Building vs. in a Network Operations Center
Whether your site is aimed at primarily selling products over your Web site or handling e-operations applications, the need for security increases with the potential for increased revenues and reduced costs. As the breadth of your e-business plans increase, so does the need for a robust security strategy in the context of an e-business approach that your organization is taking.
The levels of security vary by the types of activities that you are trying to accomplish. Table 1 compares various applications by the level of security needed.
Table 1: Comparing Typical Applications by Security Approaches Shows the Pervasive Role of Firewalls
Applications |
Access Control |
Firewall |
Software Import Controls |
Encryption |
Incident Handling |
Remote access |
X |
X |
X |
||
Electronic mail |
X |
X |
|||
Information publishing |
X |
X |
|||
Research |
X |
X |
X |
||
Electronic commerce |
X |
X |
X |
X |
X |
The fundamental question in working with an ASP is whether your organization has the security expertise to administer access controls, firewalls, software import controls, and encryption, as well as the ability to troubleshoot incidents. Clearly, if your organization also has remote access, there is a security issue for dial-in access being compromised. With many of the certification programs today focusing on security, system administrators in your organization may already be learning about firewalls and how to ensure encryption throughout your own complex of servers. IT organizations are increasingly either hiring security experts or getting their existing staffs up-to-speed on how to work with firewalls and complete incident handling. Skills for keeping your own data safe in your organization are increasingly focused on how to repel hacker attacks. International Data Corporation recently completed a survey of 1,000 technology companies and found that the majority of companies spend the majority of their time working to resolve or repel viruses on both workstations and servers.
In conclusion, developing security strategies for your online initiatives is critical for the success of your business. Being vigilant about turning security into a strength and alleviating losses electronically is what this section is focused on. Just as you have a marketing plan, be sure to pursue a security plan as well.