Abstract
In these years, many researchers proposed the way — to isolate the computers with sensitive information from outside attackers or unauthorized users. The Taiwan government has ruled the importance of network isolation in several policies, such as “The Handling Implementation Program of Information Security Emergency Incidents for government departments” and “The Responding Protocol of Notifying Information Security Events in Executive Yuan and its Departments.” However, there are few materials available for implementing network isolation. In ISO-17799, there is no implementation guidance for practicing network isolation but auditing network physical isolation. This paper provides the implementation guidance of network isolation with some logical isolation techniques and management polices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Information security: emerging cyber-security issues threaten federal information systems’ United States Government Accountability Office, Report to Congressional Requesters (May 2005)
Ho, S.-Y.: The thread and situation of global information security market, Market Intelligence Center in Industrial Development Bureau Ministry of Economic Affairs, Technical Reports (July 7, 2006)
The practical plan to eliminate crisis events in information security for departments, National Information and Communication Security Taskforce, Programs (October 21, 2004)
The notifying and responding procedures for offense against information security in Executive Yuan and its departments. Researching, Developing and Evaluating Commission of Executive Yuan, Programs, (November 2, 2005)
Edwards, M.J.: Understanding network security (December 1997), Available at: http://www.windowsitlibrary.com/Content/121/02/1.html Accessed (May 1, 2006)
Nyoni, E.: Technical options oF computerized world (2000), (Accessed May 1, 2006), Available at: http://www.wmo.ch/web/www/reports/nyoni.html
CISCO, Network admission control (Accessed October 10, 2006), Available at http://www.cisco.com/en/US/netsol/ns466/networking_solutions_package.html
Microsoft, Network access protection (Accessed October 10, 2006), Available at http://www.microsoft.com/technet/itsolutions/network/nap/default.mspx
Whale Communications, Air gap architecture (Accessed May 1, 2006), Available at http://www.whalecommunications.com/site/whale/corporate/homepage.html
Farn, K.-J., Lin, S.-K., Cheng, T.-S.: First Step in the Definition of Network Segregation for Security. In: Proceedings of Information Security Conference 2005, Kau-Shong, Taiwan (June 2005)
Lee, Z.-P.: The secure isolation gap, China Pattern: CN2588677 (November 26, 2003)
Chen, X.: Feature and application of GAP technique. Ningxia Engineering Technology 4(3), 244–246 (2005)
He, H.-J., Zhang, Y.-J., Jiao, X.-G., Hou, F.-Y.: The network security control device based on monitoring data exchange for the physical isolation, China Pattern: CN1421794 (June 4, 2003)
Wang, Z.-H., Han, D.-W.: The physical isolation switches: introduction and practice, China Pattern:CN1464403 (December 31, 2003)
ISO/IEC, Information technology - Code of practice for information security management, ISO/IEC 17799 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lai, YP., Tai, JH. (2007). Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard. In: Enokido, T., Barolli, L., Takizawa, M. (eds) Network-Based Information Systems. NBiS 2007. Lecture Notes in Computer Science, vol 4658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74573-0_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-74573-0_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74572-3
Online ISBN: 978-3-540-74573-0
eBook Packages: Computer ScienceComputer Science (R0)