Skip to main content
  • 873 Accesses

Abstract

Large networks, which are often distributed over physically separate locations, require a coherent security approach. This paper introduces the concept of secure network zones, arranged in “onion-like” layers, providing increasing security levels towards the inner, more secure zones.

Increased security is provided by both protective layers around sensitive networks and additional (cumulative) security measures, ranging from basic measures such as hardening and firewalls to more sophisticated techniques such as intrusion detection and encryption of transmitted and stored data.

The implementation of secure network zones is described, including classification of data, assignment of applica-tions to zones, and data flow. A path for the migration of existing environments is discussed and recommendations for special use cases are provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Bell, David Elliott and La Padula, Leonard J.: Secure Computer Systems: Mathematical Foundations. MITRE Corporation, 1973.

    Google Scholar 

  • Bell, David Elliott and La Padula, Leonard J.: Secure Computer System: Unified Exposition and Mul-tics Interpretation. MITRE Corporation, 1976.

    Google Scholar 

  • Landwehr, C.E., C.L. Heitmeyer, and J. McLean, “A Security Model for Military Message Systems,” ACM Trans. on Computer Systems Vol. 9, No. 3 (Aug. 1984), pp. 198-222.

    Article  Google Scholar 

  • Zeltser, Lenny: Firewalls, Perimeter Protection, and VPNs. GCFW Practical Assignment, SANS, December 2000, p. 13-35.

    Google Scholar 

  • Zeltser, Lenny: Firewall Deployment for Multitier Applications. http://www.informit.com/articles/arti-cle.aspx?p=26254, informIT, April 5, 2002.

  • Buecker, Axel; Carreno, Ana Veronica; Field, Norman; Hockings, Christopher; Kawer, Daniel; Mo-hanty, Sujit; Monteiro, Guilherme: Enterprise Security Architecture. IBM Redbook, IBM International Technical Support Organization, August 2007, p. 29-39.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Norbert Pohlmann Helmut Reimer Wolfgang Schneider

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Vieweg+Teubner | GWV Fachverlage GmbH

About this chapter

Cite this chapter

Wimmer, P. (2010). Secure Network Zones. In: Pohlmann, N., Reimer, H., Schneider, W. (eds) ISSE 2009 Securing Electronic Business Processes. Vieweg+Teubner. https://doi.org/10.1007/978-3-8348-9363-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-8348-9363-5_23

  • Publisher Name: Vieweg+Teubner

  • Print ISBN: 978-3-8348-0958-2

  • Online ISBN: 978-3-8348-9363-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics