22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1.2.3 IT infrastructure<br />

12 Lotus Security Handbook<br />

thus connect two machines in that manner, the minimum definition of a network<br />

is two devices.<br />

For the purpose of this redbook, it is assumed that a network is more than two<br />

computers exchanging data over a single cable. The scope includes two or more<br />

computers utilizing any and all connectivity and telecommunication devices, such<br />

as hubs, routers, gateways, switches, and so forth.<br />

The definition of IT infrastructure is broader than that of a computer system or a<br />

computer network.<br />

The IT infrastructure includes all the components used for the processing and<br />

transmission of information in an organization. It includes also all the devices that<br />

provide additional services, for example:<br />

► Backup devices (such as tape drives, tape robots or silos)<br />

► Security devices (for example, proxies and firewalls)<br />

► Special-purpose devices (printers, scanners, and so forth)<br />

In addition, the definition of IT infrastructure also encompasses all the computer<br />

networks in the organization and includes, as well, proprietary networks that<br />

interconnect the organization with partner organizations (for instance, suppliers).<br />

This last type of network is called an extranet. Where an extranet fits into an<br />

organization’s IT infrastructure depends largely on the amount of control the<br />

organization has over it.<br />

Finally, the definition of IT infrastructure also includes boundary networks<br />

between the internal, generally trusted network and the external, generally<br />

untrusted Internet.<br />

1.2.4 Computer security<br />

The National Institute of Standards and Technology (NIST) has written a<br />

document titled “An Introduction to Computer Security: The NIST Handbook”<br />

(Special Publication 800-12). A PDF version of this document can be freely<br />

downloaded at the following URL:<br />

http://csrc.nist.gov/publications/nistpubs/800-12/handbook.pdf

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!