Template by:
Free Blog Templates

Minggu, 24 April 2011

Network Security is Very Important


Since the rise in popularity of the Web, they have begun to make use of our computers for a much wider range of tasks than ever before. At home, they buy our food, do our banking, buy birthday presents, send communications by electronic mail, write our life story on social networking sites; at work, our businesses provide e commerce by sites, staff send & get emails, phone calls & video conferencing are completed through the network using IP based services; all of this is completed online & it would present a serious security threat if it wasn't for the fact they have various security measures at our disposal. I would like to cover some basic examples of how network security helps to keep us safe online, both at home & in the workplace.

Any computer network used for business ought to employ lovely network security practices in order to keep free from assaults by hackers. There is a few ways a hacker can hurt your business:

Denial of Service
A denial of service assault is used to make your network, or more exactly your web-site, unavailable to potential users; they do this by flooding the net server with so lots of requests for knowledge that it makes use of up all the resources of the net server, which either makes the net server crash, or slow down a lot that it cannot handle requests from the websites' intended users, your customers.

BlackHat Hacking
There is people called hackers with technical knowledge to be able to penetrate insecure networks with the intent of doing destroy to the devices attached on the network & costing the company as much money as feasible. Typical destroy would involve changing the configuration of network devices such as servers & routers so that the network becomes unavailable; this can take a long time to fix, which translates to a loss of earnings where productivity is drastically reduced. Even worse, a hacker can gain access to sensitive knowledge such as credit card details or client/patient records; they may even take control of your network based phone method & make costly long distance calls at your expense. The destruction completed can cost your company thousands of pounds, if not more, over the space of a weekend alone.
At home, a hacker has less scope to do destroy, but in case you keep sensitive knowledge on your PC, like credit card details or scanned images of important documents such as passports & driving licenses, it is clear to see that a hacker may cause you all sorts of grief.

There is a few technologies & devices that can help keep your network safe:

Firewall
A firewall makes use of a set of rules to permit or deny access to a network; usually a firewall lives inside of a router. This router is likely to be the peiece of hardware that sits on the fringe of your network & provides access to the Web. The set of rules are based on opening & closing ports relating to protocols; if the network users don't use a positive protocol, then the router will keep that port closed.

Access Control Lists
An access control list is much like a firewall; it filters traffic based on a few metrics contained within an IP packet. The Access Control List (ACL) will be configured to check each packets' source & location IP address, also the source & location port number. The network administrator will write the ACL, specifying which range of IP addresses can talk to which other range of IP addresses & which protocols they can use when communicating. This makes it hard for a hacker to gain access around a network, where each router is doing its best to block unauthorised access.

Encryption
Encryption is simple; an algorithm is used to turn significant knowledge in to a format that makes no sense & can only be decrypted by someone with access to the specific algorithm. Whenever sending sensitive knowledge across the net, it is advisable to send it using high levels of encryption.

WEP / WPA
Nowadays, everyone has got a wireless network at home, allowing them to access the Web using their laptop computer computer computer computer computer in any room. Defending your wireless network is a must, otherwise someone geographically close to you can connect to your network; this is a hackers paradise. Research has shown that WPA & the new version, WPA2, are far more secure than WEP. So when you are next setting up your wireless home router, make positive your security is set to WPA2.

0 komentar:

Posting Komentar