{"id":59,"date":"2013-03-31T23:38:51","date_gmt":"2013-03-31T23:38:51","guid":{"rendered":"https:\/\/www.softwareab.net\/wordpress\/?p=59"},"modified":"2013-04-22T12:11:12","modified_gmt":"2013-04-22T12:11:12","slug":"whitepaper-02-01-cost-efficient-network-security-architecture","status":"publish","type":"post","link":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/","title":{"rendered":"Whitepaper 02-01: Cost-Efficient Network Security Architecture"},"content":{"rendered":"<p><a href=\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2013\/03\/Cost-Efficient-Network-Security-Architecture-for-Startups.pdf\">Download &#8220;Cost-Efficient Network Security Architecture for Startups&#8221; here!<\/a><\/p>\n<p>In this white paper, we look at a notional (but typical) small business. This notional organization faces unique challenges as a small company competing in a difficult business environment. As an information systems services provider, its network must provide a high degree of confidentiality, integrity, and availability (the CIA Triad)<a title=\"\" href=\"file:\/\/\/C:\/Users\/andy.bruce\/Documents\/Unprotected\/school\/Norwich\/Course02\/Research%20Paper%2001\/Cost-Efficient%20Network%20Security%20Architecture%20for%20Startups.doc#_edn1\">[i]<\/a> \u00e2\u20ac\u201c the loss of any of these elements translates to a loss of its customers&#8217; trust. At the same time, it must be economical; overhead personnel must be funded from existing revenues.<!--more--><\/p>\n<p>Our notional network infrastructure must satisfy these conflicting goals to provide the best cost-benefit. Specifically, we look at the following:<\/p>\n<ul>\n<li><i>Background<\/i> \u00e2\u20ac\u201c The constraints under which our notional network must function.<\/li>\n<li><i>Existing Landscape<\/i> \u00e2\u20ac\u201c The business drivers for our notional network&#8217;s configuration, the logical architecture we use to address these drivers, and our notional physical implementation.<\/li>\n<li><i>Defensive Posture<\/i> \u00e2\u20ac\u201c How we protect our notional network from external and internal attacks.<\/li>\n<li><i>Recommendations<\/i> \u00e2\u20ac\u201c Suggestions and alternatives for applying new resources to our notional network.<\/li>\n<\/ul>\n<p>Gartner identifies both virtualization and activity monitoring as top strategic IT technologies for 2010.<a title=\"\" href=\"file:\/\/\/C:\/Users\/andy.bruce\/Documents\/Unprotected\/school\/Norwich\/Course02\/Research%20Paper%2001\/Cost-Efficient%20Network%20Security%20Architecture%20for%20Startups.doc#_edn2\">[ii]<\/a> In our notional infrastructure, we address both of these technologies, but temper our adoption based on <b>reliability<\/b> as the single most important consideration for us, closely followed by <b>affordability<\/b>. We analyze existing shortcomings and suggest new solutions with these constraints in mind.<\/p>\n<div><br clear=\"all\" \/><\/p>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<div>\n<p><a title=\"\" href=\"file:\/\/\/C:\/Users\/andy.bruce\/Documents\/Unprotected\/school\/Norwich\/Course02\/Research%20Paper%2001\/Cost-Efficient%20Network%20Security%20Architecture%20for%20Startups.doc#_ednref1\">[i]<\/a>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 Charles P. Pfleeger and Shari Lawrence Pfleeger, <i>Security in Computing<\/i>, 3<sup>rd <\/sup>\u00c2\u00a0ed. (Upper Saddle River, NJ: Prentice Hall, 2003), pg. 10. Dr. Pfleeger is widely credited with the first mention of the term CIA Triad in his first edition of this book (same publisher, dated 1989).<\/p>\n<\/div>\n<div>\n<p><a title=\"\" href=\"file:\/\/\/C:\/Users\/andy.bruce\/Documents\/Unprotected\/school\/Norwich\/Course02\/Research%20Paper%2001\/Cost-Efficient%20Network%20Security%20Architecture%20for%20Startups.doc#_ednref2\">[ii]<\/a>\u00c2\u00a0\u00c2\u00a0\u00c2\u00a0 \u00e2\u20ac\u0153Gartner Identifies the Top 10 Strategic Technologies for 2010,\u00e2\u20ac\u009d Gartner Corp. press release, October 20, 2010, on the Gartner Corp. Web site, <a href=\"http:\/\/www.gartner.com\/it\/page.jsp?id=1210613\">http:\/\/www.gartner.com\/it\/page.jsp?id=1210613<\/a> (accessed: September 15, 2010).<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Download &#8220;Cost-Efficient Network Security Architecture for Startups&#8221; here! In this white paper, we look at a notional (but typical) small business. This notional organization faces unique challenges as a small company competing in a difficult business environment. As an information &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"more-link\" href=\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/\"> <span class=\"screen-reader-text\">Whitepaper 02-01: Cost-Efficient Network Security Architecture<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,4],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Whitepaper 02-01: Cost-Efficient Network Security Architecture - softwareab<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Whitepaper 02-01: Cost-Efficient Network Security Architecture - softwareab\" \/>\n<meta property=\"og:description\" content=\"Download &#8220;Cost-Efficient Network Security Architecture for Startups&#8221; here! In this white paper, we look at a notional (but typical) small business. This notional organization faces unique challenges as a small company competing in a difficult business environment. As an information &hellip; Whitepaper 02-01: Cost-Efficient Network Security Architecture Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"softwareab\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/cloudraticsolutions\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/cloudraticsolutions\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-31T23:38:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-04-22T12:11:12+00:00\" \/>\n<meta name=\"author\" content=\"Andrew Bruce\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@realcloudratics\" \/>\n<meta name=\"twitter:site\" content=\"@realcloudratics\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Bruce\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/\"},\"author\":{\"name\":\"Andrew Bruce\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"headline\":\"Whitepaper 02-01: Cost-Efficient Network Security Architecture\",\"datePublished\":\"2013-03-31T23:38:51+00:00\",\"dateModified\":\"2013-04-22T12:11:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/\"},\"wordCount\":304,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"articleSection\":[\"Network\",\"Teknophobia\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/\",\"name\":\"Whitepaper 02-01: Cost-Efficient Network Security Architecture - softwareab\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#website\"},\"datePublished\":\"2013-03-31T23:38:51+00:00\",\"dateModified\":\"2013-04-22T12:11:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwareab.net\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitepaper 02-01: Cost-Efficient Network Security Architecture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#website\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/\",\"name\":\"softwareab\",\"description\":\"Technocratica, Technopolitik, Technophobia\",\"publisher\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwareab.net\/wordpress\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600\",\"name\":\"Andrew Bruce\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg\",\"contentUrl\":\"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg\",\"width\":400,\"height\":330,\"caption\":\"Andrew Bruce\"},\"logo\":{\"@id\":\"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/\"},\"description\":\"Team-oriented systems mentor with deep knowledge of numerous software methodologies, technologies, languages, and operating systems. Excited about turning emerging technology into working production-ready systems. Focused on moving software teams to a higher level of world-class application development. Specialties:Software analysis and development...Product management through the entire lifecycle...Discrete product integration specialist!\",\"sameAs\":[\"http:\/\/cloudraticsolutions.net\/\",\"https:\/\/www.facebook.com\/cloudraticsolutions\/\",\"https:\/\/twitter.com\/realcloudratics\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitepaper 02-01: Cost-Efficient Network Security Architecture - softwareab","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/","og_locale":"en_US","og_type":"article","og_title":"Whitepaper 02-01: Cost-Efficient Network Security Architecture - softwareab","og_description":"Download &#8220;Cost-Efficient Network Security Architecture for Startups&#8221; here! In this white paper, we look at a notional (but typical) small business. This notional organization faces unique challenges as a small company competing in a difficult business environment. As an information &hellip; Whitepaper 02-01: Cost-Efficient Network Security Architecture Read More &raquo;","og_url":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/","og_site_name":"softwareab","article_publisher":"https:\/\/www.facebook.com\/cloudraticsolutions\/","article_author":"https:\/\/www.facebook.com\/cloudraticsolutions\/","article_published_time":"2013-03-31T23:38:51+00:00","article_modified_time":"2013-04-22T12:11:12+00:00","author":"Andrew Bruce","twitter_card":"summary_large_image","twitter_creator":"@realcloudratics","twitter_site":"@realcloudratics","twitter_misc":{"Written by":"Andrew Bruce","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/#article","isPartOf":{"@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/"},"author":{"name":"Andrew Bruce","@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"headline":"Whitepaper 02-01: Cost-Efficient Network Security Architecture","datePublished":"2013-03-31T23:38:51+00:00","dateModified":"2013-04-22T12:11:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/"},"wordCount":304,"commentCount":0,"publisher":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"articleSection":["Network","Teknophobia"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/","url":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/","name":"Whitepaper 02-01: Cost-Efficient Network Security Architecture - softwareab","isPartOf":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#website"},"datePublished":"2013-03-31T23:38:51+00:00","dateModified":"2013-04-22T12:11:12+00:00","breadcrumb":{"@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwareab.net\/wordpress\/whitepaper-02-01-cost-efficient-network-security-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwareab.net\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Whitepaper 02-01: Cost-Efficient Network Security Architecture"}]},{"@type":"WebSite","@id":"https:\/\/www.softwareab.net\/wordpress\/#website","url":"https:\/\/www.softwareab.net\/wordpress\/","name":"softwareab","description":"Technocratica, Technopolitik, Technophobia","publisher":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwareab.net\/wordpress\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/1337443eaeb75104e0410b508e67f600","name":"Andrew Bruce","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg","contentUrl":"https:\/\/www.softwareab.net\/wordpress\/wp-content\/uploads\/2024\/03\/andy-cartoon.jpg","width":400,"height":330,"caption":"Andrew Bruce"},"logo":{"@id":"https:\/\/www.softwareab.net\/wordpress\/#\/schema\/person\/image\/"},"description":"Team-oriented systems mentor with deep knowledge of numerous software methodologies, technologies, languages, and operating systems. Excited about turning emerging technology into working production-ready systems. Focused on moving software teams to a higher level of world-class application development. Specialties:Software analysis and development...Product management through the entire lifecycle...Discrete product integration specialist!","sameAs":["http:\/\/cloudraticsolutions.net\/","https:\/\/www.facebook.com\/cloudraticsolutions\/","https:\/\/twitter.com\/realcloudratics"]}]}},"_links":{"self":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/59"}],"collection":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/comments?post=59"}],"version-history":[{"count":5,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/59\/revisions"}],"predecessor-version":[{"id":148,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/posts\/59\/revisions\/148"}],"wp:attachment":[{"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/media?parent=59"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/categories?post=59"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softwareab.net\/wordpress\/wp-json\/wp\/v2\/tags?post=59"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}