What is Logical Security?
Logical Security
Security measures that are enforced by logical* (non-physical**) means.
For example:
-
Firewall that drops packets if the destination port is a certain number
-
Computer login credential check that employs a strong password policy
-
Email server that employs software algorithm to automatically delete suspicious or malicious email messages
-
Information are exchanged over a USB drive that is protected by the latest encryption standard.
So how does logical security relate to cyber security, network security, IT security, and information security?
Find out more.
*Logical Security (義理保安)
**Physical Security (實體保安)
Cyber Security
Security measures (technical & administrative) that mitigate risks posed by threats coming from cyber space.
For example:
-
Employ stateful firewalls to mitigate denial of service attack of web servers
-
Training employees to mitigate the risk of ransomware delivered by phishing emails
-
Employ intrusion detection system, create metrics, and conduct reviews for future actions
This can be considered a subset of Network Security
Network Security
Security measures (technical, administrative & physical) that protect network infrastructure from both external and internal devices and users.
For example:
-
Prevent unauthorised access to network port using physical means
-
Isolate network for finer access control by segmentation using VLAN
-
Close and filter all un-used network ports by default
This can be considered a subset of IT Security
IT Security
Security measures that protect digital information asset, application processes, and computing hardwares from both physical and logical attacks.
For example:
-
Patch management to ensure all endpoints are patched within 24 hours
-
Password policy to creating strong passwords
-
Secure server racks’ and server rooms’ physical access
-
Storage encryption and backup procedures
This can be considered a subset of Information Security
Information Security
Security programme that protect information asset in all forms from all identified threats using all available security disciplines.
For example:
-
Legal protections (e.g. patent, NDAs, law enforcement liaison)
-
Physical Protection Systems (e.g. access control, intrusion detection, video)
-
IT Security (e.g. firewalls, logins credentials, email sandboxing)
-
Investigations (e.g. incident report training, forensics, record keeping)
-
Insider threat program, and much more.
All general security principles apply: Layered, Balance, and Robustness
The Future
Holistic approach is the future.
Siloed approach where different security disciplines work independently will be history. Your threat sources know no boundary and will attack from all angles. Holistic security management is your best defence.
When one knows only a hammer, everything looks like a nail (derived from Abraham Maslow).