Friday, September 16, 2011

A Quick Introduction to Network Security Measures

The computer network is perhaps the most important system that is running within your company. Your network powers almost everything that the computers do - from daily essential tasks like email to surfing on the Internet, sharing documents, sharing printers, etc. So if your network happens to be down, the entire organization is greatly inconvenienced. Lots of man hours would be wasted. And if the network is down repeatedly, productivity will decline. There are many reasons that may cause a network to be down. We are talking about network security issues here. Minor network security breaches involve attack on the personal workstation. For example, a workstation may be infested with viruses or spyware. Viruses and spyware are types are software that operate mostly in the background. They are usually installed on the computers without the permission of the user and perform malicious operations such as hijacking browsers or wiping out hard disk drive data. More serious network security breaches involve real time attack on the servers. As the servers power many important functions of the network e.g. sending or receiving email, or storing confidential company data, the consequences are disastrous if servers have been compromised. The general term for server attacks is known as "intrusion". Earlier, we have briefly discussed how a personal workstation can be compromised by viruses or spyware. This is also a form of intrusion on the personal computer. This form of intrusion is usually passive. In other words, it may involve some action from the user in order for the software to be installed. For instance, the user may be browsing malicious websites, or an individual may have installed a virus accidentally, thinking that it was an innocent game. Another form of active, which is an active form of attack, involves sending packets of data to a server until the server slows down to a crawl, thus rendering it useless. This is also known as denial of service DDOS attacks. The servers wont be able to process requests sent to them until these malicious packets of data are somehow blocked. Otherwise, the whole network continues to be malfunctioning. These are all various ways that a network can be compromised. From innocent little games to aggressive data packet attacks. Fortunately, there are network security solutions available that will help safeguard the network. There are many different levels of network security. For security engineers, the challenge is always to decide on adequate protection without inconveniencing the users. Users may be inconvenienced when security hardware or software starts to interfere with other applications. For instance, the newly installed Firewall may be preventing some software from accessing the Internet. A comprehensive network security program involves hardware and software security, as well as a sound educational program for the users. Users must be trained so that they know what to do. A firewall can only be used to block so many websites. Ultimately, its up to the users to exercise discretion when surfing dubious websites. Always consult network security professionals to explore various options before implementing a network security plan.

No comments:

Post a Comment