NETWORK
SECURITY
www.soc
Network security consists of the policies adopted to
prevent and monitor unauthorized access, misuse, modification, or denial of a
computer network and network-accessible resources. Network security involves the
authorization of access to data in a network, which is controlled by the network administrator.
Network security is a complicated subject, historically only
tackled by well-trained and experienced experts. However, as more and more
people become "wired'', an increasing number of people need to understand the
basics of security in a networked world. This document was written with the
basic computer user and information systems manager in mind, explaining the
concepts needed to read through the hype in the marketplace and understand
risks and how to deal with them.
What Is Network
Security and How Does It Protect You?
After asking What is
network security?, you should ask, What are the threats to my network?
Many network security
threats today are spread over the Internet. The most common include:
·
Viruses, worms, and
Trojan horses
·
Spyware and adware
·
Zero-day attacks, also
called zero-hour attacks
·
Hacker attacks
·
Denial of service
attacks
·
Data interception and
theft
·
Identity theft
How Does Network
Security Work?
To understand What is
network security?, it helps to understand that no single solution protects you
from a variety of threats. You need multiple layers of security. If one fails,
others still stand.
Network security is
accomplished through hardware and software. The software must be constantly
updated and managed to protect you from emerging threats.
A network security
system usually consists of many components. Ideally, all components work
together, which minimizes maintenance and improves security.
Network security
components often include:
·
Anti-virus and
anti-spyware
·
Firewall, to block
unauthorized access to your network
·
Intrusion prevention
systems (IPS), to identify fast-spreading threats, such as zero-day or
zero-hour attacks
·
Virtual Private
Networks (VPNs), to provide secure remote access
Some
history of networking is included, as well as an introduction to TCP/IP and inter networking. We go on to consider
risk management, network threats, firewalls, and more special-purpose secure
networking devices.
Security is a very
difficult topic. Everyone has a different idea of what ``security'' is, and
what levels of risk are acceptable. The key for building a secure network is to define what security means to your
organization. Once that has been
defined, everything that goes on with the network can be evaluated with respect
to that policy. Projects and systems can then be broken down into their
components, and it becomes much simpler to decide whether what is proposed will
conflict with your security policies and practices.
Many people pay great amounts of lip service to security, but do
not want to be bothered with it when it gets in their way. It's important to
build systems and networks in such a way that the user is not constantly
reminded of the security system around him. Users who find security policies
and systems too restrictive will find ways around them. It's important to get
their feedback to understand what can be improved, and it's important to let
them know why what's been done has been, the sorts of risks that are deemed
unacceptable, and what has been done to minimize the organization's exposure to
them.
This comment has been removed by the author.
ReplyDelete