Network Security
Essay by review • December 6, 2010 • Research Paper • 1,619 Words (7 Pages) • 2,255 Views
Network Security
CIS 319
11/18/04
Table of Contents
1. Intro to network security page 3
Why do we need network security? Page 3
Who are we protecting ourselves from? Page 4
2. How to protect yourself? Page 4
3. Security Technology Page 5
Firewall Page 6
VPN Page 6
Anti-virus Page 7
Intrusion detection Page 7
Network device security Page 7
Routers Page 7
Switches Page 8
Encryption Page 8
4. Conclusion Page 8
5. Glossary Page 9
6. References Page 10
1. What is network security?
Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself.
Threats to your network is becoming more complex and it is requiring lots of money, time and sacrifices to keep up with the growing amount of potential attacks. Companies cannot protect themselves with just a firewall anymore. Now it's requiring a full security department that monitors the network activity 24/7. It also limits the activity that companies can do because of the added security to the network, prevent invasions or viruses or hackers.
Why do we need network security?
Network security can be used under many different scenarios. For example, it can be used to keep company servers protected from the different departments. When putting access level restrictions on each department like HR and Engineering, you can control what they can and can't have access to. You wouldn't want someone from Engineering to see everyone's personal information. In another example, network security is used to protect the money you have at your bank. More and more things are being tracked on computers, it's essential to understand how to protect it from getting into the wrong hands.
Who are we protecting ourselves from?
It's an unfortunate thing to think about but we are protecting ourselves from ourselves. Although it seems like this is all new, we have always protected ourselves in one way or another. Castles would build themselves motes, farmers would build fences to protect their cattle, and people put locks on their doors. It's the same type of the thing, protecting your computer data from getting in the wrong hands.
Who are these wrong hands? The familiar term is hacker which Webster's dictionary describes as "3: an expert at programming and solving problems with a computer 4: a person who illegally gains access to and sometimes tampers with information in a computer system". One of the main reasons for the high level of network security is because of the bad part of the computer hacking world.
2. How to protect yourself?
Protecting yourself is only effective if you know what you are protecting your against and how to protect. There are a couple ways to start getting you more protected. The first is installing the default operating system. This would have a default password, no security patches and no virus protection. The second thing you don't want to do is use simple and common passwords like for example, password. In the 10 immutable laws below, one of the laws is someone is always trying to guess your password so make sure it's unique. A third suggestion would be to keep as many ports that you don't need closed and a firewall can do this which is covered in the 3rd section on Security Technologies. Finally, make sure you don't click on any email that you don't recognize or looks suspicions. Many viruses get spread by opening emails or clicking on the link inside. This rule would help decrease the spread of those pesky viruses.
Culp (2000), Microsoft TechNet lists the 10 immutable laws of network security.
Law #1: Nobody believes anything bad can happen to them, until it does
Law #2: Security only works if the secure way also happens to be the easy way
Law #3: If you don't keep up with security fixes, your network won't be yours for long.
Law #4: It doesn't do much good to install security fixes on a computer that was never secured to begin with.
Law #5: Eternal vigilance is the price of security
Law #6: There really is someone out there trying to guess your password.
Law #7: The most secure network is a well-administered one.
Law #8: The difficulty of defending a network is directly proportional to its complexity
Law #9: Security isn't about risk avoidance, it's about risk management
Law #10: Technology is not a panacea.
3. Security Technologies
Some ways to protect yourself and your property is to implement some of today's latest network technologies. One thing to keep in mind is
...
...