Analysis Of Diferent Features And The Application Of Cisco's Securex Architecture In Secure Environment
By
Abstract
In this study, we try to explore the concept of “Future of Network Security” in a holistic context. The main focus of the research is on “Network Security” and its relation with cloud computing. The research also analyzes many aspects of network security and tries to gauge its effect on “Cisco, SecureX, and Security architecture. Finally, the research describes various factors which are responsible for “Network Security” and tries to describe the overall effect of network security on Cisco, SecureX, and Security architecture.
Table Of Contents
Abstract2
Chapter 1: Introduction3
Problem Statement4
Background4
Purpose6
Hypothesis6
Objectives of the study7
Significance7
Chapter 2: Literature Review9
Chapter 3: Methodology11
Data Collection Techniques11
Scope & Limitations12
Procedure12
Assumptions13
Chapter 4: Preliminary Results And Discussion14
Long-Range Consequences14
Chapter 5: Expected outcomes of the project16
Expected Findings And Summary16
References18
The Potential Future Of Network Security provided by Cisco's SecureX Architecture
Chapter 1: Introduction
In an increasingly mobile, borderless world, this construct is becoming significantly less relevant. To address new network and security dynamics, new security architectures need to be much more sophisticated. We need a sophisticated policy language that can be expressed in terms of who, what, where, when, and how. Security needs to be separated from the physical infrastructure underneath it. And it needs to be highly distributed so it can be deployed globally and can be available wherever and whenever the borderless enterprise touches the public Internet. Cisco has developed a bold new architecture to meet the needs of borderless networks, allowing organizations large and small to collaborate easily, and their new workforce to roam freely, with confidence (Midkiff, 2008). This architecture allows for more effective, higher-level policy creation and enforcement. Since it uses a broad array of parameters for policy, it allows for much more effective security and enables situational awareness. Instead of a great many complex firewall rules, security policy can now be based on context, such as “the VP of sales can access the global sales forecast, but if she is seeking access through a smartphone in China using a strange protocol, and meanwhile she already authenticated herself through the main campus in California two hours ago, this connection is invalid” (Spainhower et al, 2008).
Problem Statement
This sort of intelligent policy enforcement uses next-generation scanning elements that are meshed into the new Cisco® SecureX Architecture. Within this new architecture, the next-generation endpoint is able to automatically find the nearest scanning element somewhere in the virtual security fabric and to make a seamless connection. The behavior of a hacker halfway around the world is noted, that information is shared, and traffic from the hacker's servers is blocked because your network now knows that it comes from someone that it cannot trust. Policy is centrally managed, but intelligence is gathered globally, with highly distributed enforcement (Garcia-Luna-Aceves, 2005).
Background
Network integrity is associated with cramped computer preservation: these days it is difficult to separate one from another. All of the electronic lock on the door of the hotel to the mobile and desktop components, attached to the ...