วันเสาร์ที่ 28 กรกฎาคม พ.ศ. 2555
A quick introduction to network security measures
The computer network is perhaps the most important system that is running within your company. Your network powers almost everything that computers do - from essential everyday tasks like email to surfing the Internet, share documents, share printers, etc. So if the network happens to be down at all the organization is greatly inconvenienced. Lots of hours of work would be in vain. And if the network is down several times, productivity will decrease.
There are many reasons that can cause a network to be down. We are talking about security problems on the network here. Minor breaches of network security involving attack on the personal workstation. For example, a workstation can be infested with viruses or spyware. Viruses and spyware are types of software that operate mainly in the background. It is usually installed on computers without user consent and perform malicious operations, such as hijacking browsers or wiping data from the hard drive.
Most serious violations of network security involving an attack in real time on the servers. As the power of many servers of the important functions of the network (for example, send and receive email, or storage of confidential company data), the consequences are disastrous if the servers have been compromised. The general term for server attacks known as "intrusion".
Previously, we discussed briefly how a personal workstation can be compromised by viruses or spyware. This is also a form of intrusion into the personal computer. This form of intrusion is usually passive. In other words, may involve some action by the user so that the software to be installed. For example, the user can navigate through malicious websites, or a person who has installed a virus by accident, thinking it was an innocent game.
Another form of asset, which is an active form of attack is to send data packets to a server until the server slows to a crawl, making it useless. This is also known as denial of service (DDoS). Servers will not be able to process requests sent to them until these malicious data packets are somehow blocked. Otherwise, the entire network is malfunctioning.
These are all the different ways a network can be compromised. From small innocent games to aggressive attacks data packets. Fortunately, there are network security solutions available to help you protect your network.
There are many different levels of network security. For safety engineers, the challenge is always to decide on the adequate protection so as not to disturb the users. Users can be inconvenient when hardware or software security begins to interfere with other applications. For example, the newly installed firewall may prevent some Internet access programs.
A program of comprehensive network security involves hardware and software security, and a good educational program for users. Users should be trained to know what to do. A firewall can only be used to block so many websites. Ultimately, it's up to users to exercise discretion while surfing dubious websites.
Always consult a professional network security to explore various options before implementing a plan for network security.
สมัครสมาชิก:
ความคิดเห็น (Atom)