Mitigating network attacks requires a comprehensive, end-to-end approach that includes creating and maintaining security policies based on the security needs of an organization. The first step in establishing an organization's security needs is to identify likely threats and perform a risk analysis, the results of which are used to establish the security hardware and software implementations, mitigation policies, and network design.
To help simplify network design, it is recommended that all security mechanisms come from a single vendor. The Cisco Self-Defending Network (SDN) is a comprehensive, end-to-end solution for network security.
Cisco Security Manager - Centralized policy management for security devices
Cisco Security MARS - Security monitoring, analysis, and response system
Cisco NAC Appliance and Cisco Security Agent - Network access control and endpoint protection
Cisco IPS Sensor Software, Cisco IOS Software, and Cisco ASA Adaptive Security Appliances - Core network security
Operations security is an important part of managing a secure network. After the network is designed, operations security entails the day-to-day practices necessary to first deploy and later maintain the secure system.
Part of maintaining a secure system is network security testing. Security testing is performed by the operations team to ensure that all security implementations are operating as expected. Testing is also used to provide insight into business continuity planning.
Business continuity planning addresses the continuing operations of an organization in the event of a disaster, disruption, or prolonged service interruption that affects the mission of the organization.
After a secure network is implemented and continuity plans are established, those plans and documents must be continuously updated based on the changing needs of the organization. For this reason, it is necessary to understand the system development life cycle (SDLC) for the purposes of evaluating system changes and adjusting security implementations.
A network security system cannot completely prevent assets from being vulnerable to threats. New attacks are developed and vulnerabilities identified that can be used to circumvent security solutions. Additionally, technical, administrative, and physical security systems can be defeated if the end user community does not adhere to security practices and procedures.
If security policies are established and followed, organizations can minimize the loss and damages resulting from attacks. A comprehensive security policy must be maintained which identifies an organization's assets, specifies the security hardware and software requirements for protecting those assets, clarifies the roles and responsibilities of personnel, and establishes the proper protocol for responding to security breaches.