The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Designing a Controlled Environment for the Simulation of an Enterprise Security Infrastructure
|
Author(s): Jean-Philippe P. Labruyere (DePaul University, USA)and Linda V. Knight (DePaul University, USA)
Copyright: 2004
Pages: 4
Source title:
Innovations Through Information Technology
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59140-261-9.ch009
ISBN13: 9781616921255
EISBN13: 9781466665347
|
Abstract
Despite a growing emphasis upon computer and network security, little attention has been paid to how business enterprises or universities should approach the design of security laboratories. Such laboratories allow business professionals or students to test the effectiveness of different configurations in warding off attacks, as well as to experiment with and learn about various security devices, tools, and attack methods in a controlled manner that insures benign consequences. This paper pinpoints the critical issues that make design and implementation of a simulation environment difficult, and recommends ways of addressing these concerns through a three-step design process. Design and development principles and technical and engineering requirements proposed here can be of use to businesses or universities seeking to build a computer and network security laboratory. They can also provide a useful checklist for managers or administrators charged with the IT function to use when discussing their security laboratory with their lab’s technical designers and support staff.
|
|