Skip to main content

Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4658))

Abstract

In these years, many researchers proposed the way — to isolate the computers with sensitive information from outside attackers or unauthorized users. The Taiwan government has ruled the importance of network isolation in several policies, such as “The Handling Implementation Program of Information Security Emergency Incidents for government departments” and “The Responding Protocol of Notifying Information Security Events in Executive Yuan and its Departments.” However, there are few materials available for implementing network isolation. In ISO-17799, there is no implementation guidance for practicing network isolation but auditing network physical isolation. This paper provides the implementation guidance of network isolation with some logical isolation techniques and management polices.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Information security: emerging cyber-security issues threaten federal information systems’ United States Government Accountability Office, Report to Congressional Requesters (May 2005)

    Google Scholar 

  2. Ho, S.-Y.: The thread and situation of global information security market, Market Intelligence Center in Industrial Development Bureau Ministry of Economic Affairs, Technical Reports (July 7, 2006)

    Google Scholar 

  3. The practical plan to eliminate crisis events in information security for departments, National Information and Communication Security Taskforce, Programs (October 21, 2004)

    Google Scholar 

  4. The notifying and responding procedures for offense against information security in Executive Yuan and its departments. Researching, Developing and Evaluating Commission of Executive Yuan, Programs, (November 2, 2005)

    Google Scholar 

  5. Edwards, M.J.: Understanding network security (December 1997), Available at: http://www.windowsitlibrary.com/Content/121/02/1.html Accessed (May 1, 2006)

  6. Nyoni, E.: Technical options oF computerized world (2000), (Accessed May 1, 2006), Available at: http://www.wmo.ch/web/www/reports/nyoni.html

  7. CISCO, Network admission control (Accessed October 10, 2006), Available at http://www.cisco.com/en/US/netsol/ns466/networking_solutions_package.html

  8. Microsoft, Network access protection (Accessed October 10, 2006), Available at http://www.microsoft.com/technet/itsolutions/network/nap/default.mspx

  9. Whale Communications, Air gap architecture (Accessed May 1, 2006), Available at http://www.whalecommunications.com/site/whale/corporate/homepage.html

  10. Farn, K.-J., Lin, S.-K., Cheng, T.-S.: First Step in the Definition of Network Segregation for Security. In: Proceedings of Information Security Conference 2005, Kau-Shong, Taiwan (June 2005)

    Google Scholar 

  11. Lee, Z.-P.: The secure isolation gap, China Pattern: CN2588677 (November 26, 2003)

    Google Scholar 

  12. Chen, X.: Feature and application of GAP technique. Ningxia Engineering Technology 4(3), 244–246 (2005)

    Google Scholar 

  13. He, H.-J., Zhang, Y.-J., Jiao, X.-G., Hou, F.-Y.: The network security control device based on monitoring data exchange for the physical isolation, China Pattern: CN1421794 (June 4, 2003)

    Google Scholar 

  14. Wang, Z.-H., Han, D.-W.: The physical isolation switches: introduction and practice, China Pattern:CN1464403 (December 31, 2003)

    Google Scholar 

  15. ISO/IEC, Information technology - Code of practice for information security management, ISO/IEC 17799 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tomoya Enokido Leonard Barolli Makoto Takizawa

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lai, YP., Tai, JH. (2007). Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard. In: Enokido, T., Barolli, L., Takizawa, M. (eds) Network-Based Information Systems. NBiS 2007. Lecture Notes in Computer Science, vol 4658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74573-0_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74573-0_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74572-3

  • Online ISBN: 978-3-540-74573-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics