Skip to main content

Network Security

Types of Security Threats
In general, network security threats can be classified into one of two categories: disruption,destruction and disaster and unauthorized access. disruptions are usually minor and temporary. Some disruptions may also be caused by or result in the destruction of data. Natural or man made disasters may occur that destroy host computers or large sections of the network. Unauthorized access refers to intruders (external hackers or organizational employees) gaining unauthorized access to files. The intruder may gain knowledge, change files to commit fraud or theft or destroy information to injure the organization. 


Risk Assessment
Developing a secure network means developing controls that reduce or eliminate threats to the network. Controls prevent, detect  and correct whatever might happen to the organization when its computer based systems are threatened. The first step in developing a secure network is to conduct a risk assessment. This is done by comparing the nature of threats to the controls designed to reduce them, thus deriving levels of risk. A control spreadsheet lists the threats, the network components and the controls, which a network manager uses to assess the level of risk.

Controlling ,Disruption, Destruction and Disaster
The key principle in controlling these threats or at least reducing their impact is redundancy. Redundant hardware that automatically recognizes failure and intervenes to replace the failed component can mask a failure that would otherwise result in a service disruption. special attention needs to be given to preventing computer viruses and denial of service attacks. generally speaking preventing disasters is difficult so the best option is a well designed disaster recovery plan that includes backups and sometimes a professional disaster recovery firm.

Controlling Unauthorized Access.

The key principle in controlling un authorized access is to be proactive in routinely testing and upgrading security controls. Contrary to popular beliefs, unauthorized intruders are usually organization employees, not external hackers. There are six general approaches to preventing un authorized access:
  • Developing a security policy
  • Developing user profiles
  • Plugging known security holes
  • Securing network access points ( e.g physical security, call back modems and firewalls)
  • Preventing Eavesdropping ( By restricting access to network cables and devices)
  • Using Encryption
The basic principle in detecting unauthorized access is looking for anything out of ordinary. This means logging all messages sent and received by the network  all software used and all logins or attempted logins to the network. These logs should be monitored both by network security personnel and by software programmed to issue alarms or take action if certain parameters are exceeded or if there is an abnormal occurances.

Comments

Popular posts from this blog

Advantages of E-Commerce

Electronic Commerce increases Profits : Electronic commerce increases sales and decrease costs. Advertising on the web reaches all the users of that website. A firm can use the web to reach communities which are scattered geographically. The web's natural advantage is that it is low cost medium for disseminating information and processing transaction. for e.g the cost of advertising on the web is much less as compared to advertising in a newspaper. Another benefit of web based commerce is that information based industries excel here. A virtual organisation increases efficiency through the automation of processes. The cost of handling sales inquiries and determining product availability can be reduced with the help of e-commerce in the marketing process of the business. E-commerce increases the speed and accuracy with which businesses can exchange information which reduces costs on both sides of transactions. Another Advantage of e-commerce is ...

Unified Modeling Language- (UML)

Brief Background UML is a language for specifying,visualizing ,documenting and constructing the artifacts of software systems,as well as for business modeling and other non-software systems. UML has been developed by Grady  Booch, James Rumbaugh and Ivar Jacobson. Goals of UML are : To model systems using Object oriented concepts. To establish an explicit coupling to conceptual as well as executable artifacts To address the issues of scale inherent in complex , mission critical systems. To create a modeling language that can be used by humans as well as machines.  Understanding the thirteen diagrams of UML 2.x is an important part of understanding OO development. Although there is  far more to modeling than just the UML  the reality is the UML defines the standard modeling artifacts when it comes to object technology. There are three classifications of UML diagrams: Behavior diagrams . A type of diagram that depicts behavioral features of a ...

Local Area Networks LAN

Why use a LAN? The two basic reasons for developing a LAN are information sharing and resource sharing. Information sharing refers to business needs that require users to access the same data files ,exchange emails or search the internet for information. Resource sharing refers to one computer sharing a hardware device (for e.g a printer) or software package with other computers on the network. The main benefit of resource sharing is cost savings, while the main benefit  of information sharing is improved decision making. image courtesy Cray Networks Dedicated Server versus Peer-to-Peer Networks A dedicated server LAN has one computer that acts as the network server. It can connect with almost any other network,handle very large databases and use sophisticated LAN software. Moreover,high -end dedicated server LANs can be interconnected easily to form enterprise wide networks or in some cases replace the host mainframe central computer. Four common types of dedi...