Archive for February, 2008

SD WAN Security and SOC Operations

Wednesday, February 27th, 2008

Baseline SD WAN security provides some much needed protection but enterprises need to take extra measures to ensure that threats can be properly identified and mitigated and there are services like Fortinet that specialize in SD WAN technology. This post will help you get started by explaining some basic security concepts and security technologies.

First, it’s important to understand the basic tenets of secure network management (SNM). The goal of SNM is to ensure that data is secured against unauthorized access to the network. These measures include monitoring and filtering of network traffic, firewalls, and even hardware or software based intrusion detection systems. SNM is a key ingredient to protecting networks from various attacks including, but not limited to, DDoS attacks, DNS attacks, HTTP traffic floods, malicious software, malicious file downloads, and others.

Security Operations Center (SOC) – As a leading enterprise security solutions provider, SNM offers the highest level of security and security controls, which are constantly being updated and applied to the network and data centers. SOC is the place where data and network management is processed and decisions are made. It is also the place where security issues are escalated, investigated, and solved.

SOC has a very comprehensive process in place. The SOC Security Operations Center (SOC SOC), headquartered at L’Enfant Plaza, conducts a security assessment of any request for data from the National Security Agency. This is the first step to determine if a request is authorized and if it meets the standard of protecting all data. If the request is approved by SOC SOC, it is then sent to the NSA Data Center Security Office (DC-SPO). It takes SOC SOC a day or so to check the request, determine if the data is appropriate and authorize access. In the meantime, the NSA has the option of denying access or suspending the request.

After the review, SOC SOC sends a report to NSA headquarters. This report details the request process, the information requested and the results of the analysis. It is a short response to a complex request. It is also the final approval before the data is shared with the NSA.

Data Collection Under FISA Section 702, NSA collects Internet and phone metadata as well as content for communications involving foreign targets. The primary focus of the collection is the collection of communications of foreign intelligence targets (and presumably, targets within the United States). In addition to communications collected under Section 702, other NSA programs under which NSA collected communications of foreign intelligence targets include Stellar Wind, a program that collected the content of Americans’ communications. This is the only part of the Foreign Intelligence Surveillance Act that explicitly permits the collection of U.S. persons’ communications and records.

Sling Ice – New gooey physics platform game

Wednesday, February 20th, 2008

Use your mouse to pull, snap, flick and bounce a springy ball of gooey slime through 50 challenging levels. Clear all 50 levels with a gold time and you’ll unlock the bonus game.

read more | digg story