Know: Secrecy , Authentication

Recognize: keys Anticipates: Configuration managementAccess Control Lists (ACLs), traffic statistics





Security & NM are symbioticEdit

Security needs configuration managementEdit

Because configuration management offers a straightforward and relatively inexpensive way to protect against many security threats

For information assurance, configuration management can be defined as the management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the life cycle of an information system. CM for information assurance, sometimes referred to Secure Configuration Management, relies upon performance, functional, and physical attributes of IT platforms and products and their environments to determine the appropriate security features and assurances that are used to measure a system configuration state.

  • of keys ( encrypt )</li></li>
  • Access Control Lists (ACLs), e.g. on firewalls</li></li>
  • update configuration of devices to correct bugs that create security weaknesses

    Network management needs security

    In network, management security management is the set of functions that protects telecommunications networks and systems from unauthorized access by persons, acts, or influences and that includes many sub-functions, such as creating, deleting, and controlling security services and mechanisms; distributing security-relevant information; reporting security-relevant events; controlling the distribution of cryptographic keying material; and authorizing subscriber access, rights, and privileges.

    Privacy: Traffic stats reveal:

    </li> </li>

  • who uses network when & to whom -concern to users</li></li>
  • volumes of traffic -of interest to competitors

    Authentication: Configure devices => control how/if they work.


    </li> </li>