Chapter-2 Network Security
Chapter-2 Network Security
Contents
Introduction
Network security concerns
Security management
Service and signal availability
Wireless network controls
Protective security mechanisms
Computer security principles
Network data & information theft
Creating mobile backup
Introduction
IT
security is a challenging job that requires attention to detail at
the same time as it demands a higher-level awareness. However,
like many tasks that seem complex at first glance, IT security can
be broken down in to basic steps that can simplify the process.
That’s not to say it makes things easy, but it does keep IT
professionals on their toes.
At Technopedia, we aim to provide insight and inspiration to IT
professionals, technology decision-makers and anyone else who
is proud to be called a geek. From defining complex tech jargon
in our dictionary, to exploring the latest trend in our articles or
providing in-depth coverage of a topic in our tutorials, our goal is
to help you better understand technology - and, we hope, make
better decisions as a result.
…Cont.
In the context of computer systems, authentication is a
process that ensures and confirms a user’s identity.
Authentication is one of the five pillars of information
assurance (IA). The other four are integrity, availability,
confidentiality and non-repudiation.
The Public Key Infrastructure (PKI) authentication method
uses digital certificates to prove a user’s identity. There are
other authentication tools, too, such as key cards and USB
tokens. One of the greatest authentication threats occurs
with email, where authenticity is often difficult to verify.
For example, unsecured emails often appear legitimate.
…Cont.
Authentication begins when a user tries to access
information. First, the user must prove his access rights
and identity. When logging into a computer, users
commonly enter usernames and passwords for
authentication purposes. This login combination, which
must be assigned to each user, authenticates access.
However, this type of authentication can be circumvented
by hackers.
A better form of authentication, biometrics, depends on the
user’s presence and biological makeup (i.e., retina or
fingerprints). This technology makes it more difficult for
hackers to break into computer systems.
Network security concerns
Dealing with common network security issues
security devices such as firewalls and anti-virus software.
security settings in the router or the operating system.
data encryption systems for sensitive data.
data backup, including the use of off-site backup
Network security issues
When businesses connect their systems and computers, one
user's problems may affect everyone on the network.
Despite the many benefits of using networks, networking
raises a greater potential for security issues such as:
o data loss
o security breaches
o malicious attacks, such as hacking and viruses
Common network security issues
Typical preventive measures to help you avoid
network security threats include:
security devices such as firewalls and anti-virus
software
security settings in the router or the operating system
data encryption systems for sensitive data
data backup, including the use of off-site backup
restricting access to the network infrastructure to
authorized personnel only
training staff in the safe and secure use of the
equipment
Importance of regular network administration and housekeeping