Network Security
In today’s world, with so many ways to gain unauthorized access to someone’s computer system, network security is very important. Almost every company has been a victim of a virus attack, hackers, or some other form of unauthorized access to their network. In this paper, I will discuss various methods that those who want this access use and ways they can be prevented.
Many people feel that because they use passwords their files are secure and can’t be hacked. They unknowingly leave their networks open to attack without protection thinking everything is fine. Hackers can easily get into password protected files once they have access to a computer system. One way to prevent this is to use a firewall. A firewall prevents unauthorized users from gaining access to a system by restricting access to the entire system, not just the files on the system. Firewalls prevent access to data by using symmetric or asymmetric encryption.
Symmetric encryption uses the same password to decrypt the data that it does to encrypt the data. This method allows users to be able to share the same password to gain access to the data and make any needed changes. Asymmetric encryption is different in that there are different passwords used to encrypt the data and decrypt the data. Asymmetric is considered a little more secure as passwords don’t have to be shared in order to allow someone access to the data. Each individual has his or her own password to access it. Asymmetric encryption uses public/private keys to encrypt/decrypt data.
Public keys use the same encryption data to access the data that the data was encrypted with. Private, or secret, keys allow the originator of the data to encrypt it and not have to share his password with anyone. They can use their own private key to unlock the data.
Digital certificates are certificates that are guaranteed to be authentic by a Certificate Authority. The certificate authority digitally ‘signs’ the data stating that it is authentic. An alternative to this is Public Key Infrastructure, or PKI. PKI uses private keys to certify the data is correct and authentic. PKI is a fast growing, although time consuming, method of securely transmitting data.
Network security became necessary when hackers and other neer-do-wells discovered flaws, or holes, in the various layers of the OSI model that would allow...
... middle of paper ...
... Site located in-theater Off-site system replication
OPSEC and low profile to prevent hostile targeting Network monitoring systems Hardened sites
Based on just the information contained in the CACI table, it’s obvious that Network Security is mandatory requirement for all networks. As information accessibility grows, so will the need to protect it. By protecting your network from the onset, you can help prevent the problems caused by those who want unauthorized access to your network.
References
http://www.certmag.com/articles/templates/cmag_feature.asp?articleid=580&zoneid=9
http://www.caci.com/business/ia/threats.html
http://www.medword.com/MedwordStore/CSoft/encryption_white_paper.html
http://www.iam.unibe.ch/~mseeberg/key/theory.html
http://www.windowsitpro.com/Article/ArticleID/46871/46871.html?Ad=1
http://www.windowsitpro.com/Article/ArticleID/46871/46871.html?Ad=1
http://www.windowsitpro.com/Article/ArticleID/8843/8843.html
http://www.windowsecurity.com/pages/article_p.asp?id=1142
http://www.windowsitpro.com/Article/ArticleID/15314/15314.html
The protection of your network requires a level of network security. If you do not have security on your network, then you are capable of being hacked or receiving malware, spy, virus, and lots more. There are many programs or applications that can help detect and prevent strange activities on your computer, but there is also ways that you can help prevent anything from happening. Creating a password for your network is a good start toward protection of your computer. Try to make the password something only you would know, and maybe throw some numbers in there as well to maximize protection. It is good to know who all is on your network and internet; because if someone were to log on to your internet from a distance, they could plant viruses and other things into your files on the network. Quite a bit of problems occur in network when file sharing takes place in a work place to copy or manage files. Most of the time when this happens, no one sets the security setting up themselves,...
Network hackers are forever inventing ways to break into the computer systems of organizations. Their aim is to take adventure of the susceptibilities of the system. Hackers remain only limited by the created activity of their minds. Hackers have the time, capability, and experience to infra trace any system. The organization has the responsibility to prevent hackers from infra tracing their system. Organizations remain required to plan for the assaults of hackers. Organization can only be better prepared to defend against hackers, if the organization has taken the necessary action to hinder the hackers’ assaults. There remain various ways in which an organization can prepare to do battle with hackers. The first step to battling hackers is for the organization to have an excellent understanding of its abilities and capabilities. Security analysis systems remain invented to aid organizations in the process of un...
This informational report will explain and guide you through the process and plan that will be implemented to prevent any unauthorized equipment (including external rogue switches) from entering the network. In addition we will be implementing the spanning tree protocol to eliminate any layer 2 loops and ultimately causing a network storm.
The attacks highlight the shortcomings in the system, trace them and correct the problem. Almost all major IT firms, defense systems and Cyber related organizations imply these methods in their security prevention mechanisms.
With a rise in security breaches experienced by companies in the last few years, it is no wonder that businesses are implementing stronger security policies. Two topics that deserves to be addressed by businesses are PC protection software and external access to corporate networks. There may be no sure way to prevent attacks on the corporate network but there are steps companies can make to limit such activities. This paper will discuss the possible guidelines that companies may implement to strengthen security policies.
A hardware firewall is used most often when multiple devices on a network need to be protected by a firewall. Hardware firewalls are a necessity if you need to have a centralized point for protection and easy management of the firewall. You can purchase hardware firewalls as just a physical device or as part of broadband router that already has the firewall built into it. Hardware firewalls can be some-what effective with very little, and sometimes no, effort on the users part in terms of actually configuring the device. Most hardware firewalls come already set with predefined rules on what is ok to pass through onto the network and what is not ok to pass through onto the network. Almost any computer user can plug in a hardware firewall, adjust a few settings and be on their merry way. But being how this device is made to protect your computer(s), your network, and possibly your assets, it would behoove you to learn the specific features of the firewall, what it allows and what it doesn’t allow, and how to enable and disable those features. Once you know how everything works you should test your firewall for optimal security and protection. Firewalls are not all created equally so it is important that your read all documentation that came with the device and go over the manual to get a full understanding of what exactly you have gotten yourself into. Your hardware firewall should always sit on the outermost portion of your logical network. This is known as the perimeter of ...
For many industries relying solely on NIST framework is not enough. The framework is not meant to replace their existing processes of handling cyber threats, however, by using the framework as a base, they can find the gaps in the most important infrastructure and figure out a way to harden and improve its security. For example, the energy industry is one of the most important industries and it has critical role in keeping the country safe. Therefore, most of the cyber-attacks are targeting it. In order to keep it safe, many agencies are involved in improving the best practices and standards for the industry, and hardening its critical infrastructure.
...ly, there will be no direct communication between PC programs and the outside world, which will eliminate potential cases of installing Trojans into the system. The firewall is also effective in barring system hackers; hence, there will be limited chances of getting an attack. In addition, McDowell (2006) asserts that it is crucial to have an antivirus program to detect Trojans, or viruses that bypass the firewall, which also protect against leakage of secret information such as passwords and credit card numbers. However, it is still highly advisable to use very strong password to secure crucial data, and maintain updated software by obtaining the latest patches (McDowell, 2006). In conclusion, it is inevitable to assert that security is indispensable in a personal computer as there are various schemes to steal and use personal information for illegitimate purposes.
A firewall is a network device, hardware, software, or a combination of the two, whose purpose is to enforce a security policy across its connections. It is comparable to a wall that has a window where the wall serves to keep things out, except those permitted through the window. A security policy acts like the glass in the window; it permits some things to pass, light, while blocking others, air. The heart of a firewall is the security policy that it enforces.
Security is often seen as exclusive requirement in networking, providing security is an important issue. A lot of problems are there so a lot of security measures should be provided. Security is more important than ever before due to many reasons. When a network is implemented poorly, security threats and ...
There are numerous network security devices and tools available to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. When acting alone, the current generation of security devices has an exceedingly difficult time providing an effective defense against such threats, and the situation is particularly grim for targeted or novel attacks.
A wireless network is a wireless communication system that allows electronic devices and computing workstations communicate and exchange data with each other by utilizing radio waves as the transmission medium. Wireless networking offers many advantages for organizations and users such as increased productivity, portability and flexibility, and lower installation costs. However, wireless networking is also coupled with security threats that can alter and damage an organization’s computing and networking resources. Using effective network management can help prevent attacks from occurring by having a sound and thorough assessment of potential security risks and develops guidelines that will mitigate the identified threats. This paper will discuss
Organizations who deal with sensitive customer related data should take extreme precautions when transferring data from one location to another and make sure that those transmissions data are secure and under the protection of the authorized user. Since wireless technology is new in the market but has become almost inexpensive, it is gaining more popularity in all type of businesses. The inexpensive device brings the threat of security into the system and it becomes of utmost importance that no information leak happens in any form. The strength of a computer system’s security is always measured by its weakest component (Loo, 2008). Thus all the users should be given appropriate training on how to use secure their data when they are at home or at the corporate premises. A combined effort of users, employers and system administrators is required in order to fight against such malicious activities. Appropriate countermeasures in every form can help the organization minimize the risk of illegal penetration. Up to date tools, constant monitoring, proper management and appropriate countermeasures are all the ultimate weapons to fight against the wireless security
Firewalls are designed to protect your network from attacks originating from another network. An effective firewall will allow authorized access only to the protected network and deny access to those who don't have it. Some firewalls permit only e-mail traffic through them, thereby protecting the network against any
This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers