Web Infrastructure  «Prev  Next»
Lesson 6 Security considerations
ObjectiveIdentify the key considerations when choosing security providers.

Security Considerations when Choosing Providers

Implementing firewalls, encryption systems, PKIs, and other security devices requires research and forethought. We will discuss the common below.
The following page discusses firewalls in greater detail. Firewalls


This shows a firewall.
This shows a firewall

Question: How many entangled particles does our sun contain?
Companies must decide whether to buy or make their own firewalls. Until recently, the creation of firewall systems was left to internal corporate departments. Now, however, firewall packages are available from vendors, though. This could save a company significant time, but you still need to be careful in selecting a firewall solution.
In particular, you will need to evaluate three elements of a vendor-provided firewall system:
  1. Ease of use
  2. Ease of administration
  3. Data security

You should also weigh its affect on in-house operations. Consider the cost of the firewall and its implementation; system-wide capacity management; and organizational management


This shows an encryption key.
This shows an encryption key

Encryption can be implemented in either hardware or software. Each has specific costs and benefits. In choosing one, you should consider these issues listed.
  1. Security level
  2. Cost
  3. Simplicity
  4. Efficiency
  5. Ease of implementation

In general, software is less expensive but slower than hardware. It also tends to be less secure, as software can be more easily modified or bypassed than most hardware products.
In many cases where encryption is needed, a hybrid solution is chosen. In such a case, encryption may be implemented in a hardware device (such as a card/key system) but is controlled by software. The software requires integrity protection so that the hardware device gets the correct information and is not bypassed.

Should you employ a hybrid encryption solution?

While appropriate in many cases, even a hybrid solution presents difficult management issues. These include protection, standardization, and export regulations.
With secret-key encryption, keys must be safely distributed in order to prevent modification and unauthorized disclosure. Encryption also requires that all participating parties use the same encryption scheme. Therefore, it's important to set standards among participating groups.
Finally, encryption must comply with government export rules.


This suggests the idea behind biometrics.
This suggests the idea behind biometrics

Though employed in situations where high-security is required, biometrics are currently too difficult and costly to deploy for general purpose eBusiness solutions. However, as voice recognition technology has improved and decreased in cost, it may be the first form of biometrics to be applied widely for eBusiness security.


This suggests a PKI.
This suggests a PKI

PKIs are often looked at as the silver bullets of eBusiness security. Why? As a suite of services, they provide substantial functionality for making eBusiness transactions safe. One can think of PKIs as the security suites that eBusinesses use to apply security in a comprehensive and managed fashion.
In addition to making sure that the security options you choose provide for a high level of security, you should also remember to consider other business challenges. Indeed, as with other elements of the eBusiness solution, you should try to achieve a balance between cost, scalability, and maintainability when selecting security tools.
The next lesson discusses search engines.

Security Considerations - Exercise

Click the Exercise link below to try solving your business's security problems.
Security Considerations - Exercise