Wednesday 23 April 2014

Network Security : Brief Introduction




Network security refers to protecting computer network from the unauthorized access, hacker’s attacks, viruses, spyware and internal and external threats.  It also refers to protecting the network from the unauthorized modifications, data lost, destruction, physical attacks and the protection of the company’s assets. Computer networks are being used to conduct the transactions, communications, data and resources sharing, orders processing, voice communication among the businesses and the individuals.   
Every computer network without proper security mechanisms can be attacked by the hackers, viruses and intruders so it is the most important responsibility of the computer network administrators to implement the security solutions.
A personal computer, gateway computer and the laptops are the common point of attacks.  Unauthorized users can steal the company’s important data.  Being an administrator you need to know the common threats and implement the solution to deal with them.  The common network threats include the following.
Common Threats
  • Viruses
  • Hacking attacks
  • Spyware
  • Adware
  • Malware
  • Trojans
  • Web Worms
  • Rootkits
  • Honeypots
  • Identity lost
  • Sniffers
  • Physical Threats
  • Dangerous Macros
  • Eavsdropping
  • Security Vulnerabilities
  • Risks from the Naive employees.
  • Denial of service attacks.
  • Data Interception.
Just ask yourself that are you ready to deal with any of the above mentioned threats?  If your answer is NO then your network is at great security risk.  As the uptime and the security are the most important thing in the computer network so you need to implement the solutions to deal with these threats. A computer network can be kept secured by implementing the following techniques and using the tools.
  • Install an up-to-dated antivirus program on all the computers and regularly scan them.
  • Install an up-to-dated anti spyware program.
  • Configure a software or hardware firewall on the gateway computer.
  • Limit the rights of the users in your network.
  • Use monitoring, diagnosing, troubleshooting and network management tools.
  • Implement an intrusion detection system as it will determine that if your network is under attack or not.
  • Use strong password, digital authentication keys, and security certifications to identify the users and control their activities.
  • Monitory the online activities of the users through he monitoring software and block the suspicious and potentially risky online applications and the websites.
  • Encrypt your messages and data while transmitting over the network.  Encryption ensures that your data cannot be intercepted or read by the unauthorized users.
  • Apply security patches against the known vulnerabilities.
  • Update your operating system regularly.
  • Lock your server room and no unauthorized user should be allowed to enter in the server room.
  • Keep inventory of all the devices including computers, hubs, switches, routers, cables, printers and scanners etc.
  • Block the unwanted ports and services.
  • Increase the security of your web browsers.
  • Regularly take backup of your critical data.

No comments:

Post a Comment