Network Security
By: Mike • Research Paper • 1,619 Words • March 31, 2010 • 800 Views
Network Security
Network Security
CIS 319
11/18/04
Table of Contents
1. Intro to network security page 3
Why do we need network security? Page 3
Who are we protecting ourselves from? Page 4
2. How to protect yourself? Page 4
3. Security Technology Page 5
Firewall Page 6
VPN Page 6
Anti-virus Page 7
Intrusion detection Page 7
Network device security Page 7
Routers Page 7
Switches Page 8
Encryption Page 8
4. Conclusion Page 8
5. Glossary Page 9
6. References Page 10
1. What is network security?
Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to protect yourself.
Threats to your network is becoming more complex and it is requiring lots of money, time and sacrifices to keep up with the growing amount of potential attacks. Companies cannot protect themselves with just a firewall anymore. Now it’s requiring a full security department that monitors the network activity 24/7. It also limits the activity that companies can do because of the added security to the network, prevent invasions or viruses or hackers.
Why do we need network security?
Network security can be used under many different scenarios. For example, it can be used to keep company servers protected from the different departments. When putting access level restrictions on each department like HR and Engineering, you can control what they can and can’t have access to. You wouldn’t want someone from Engineering to see everyone’s personal information. In another example, network security is used to protect the money you have at your bank. More and more things are being tracked on computers, it’s essential to understand how to protect it from getting into the wrong hands.
Who are we protecting ourselves from?
It’s an unfortunate thing to think about but we are protecting ourselves from ourselves. Although it seems like this is all new, we have always protected ourselves in one way or another. Castles would build themselves motes, farmers would build fences to protect their cattle, and people put locks on their doors. It’s the same type of the thing, protecting your computer data from getting in the wrong hands.
Who are these wrong hands? The familiar term is hacker which Webster’s dictionary describes as “3: an expert at programming and solving problems with a computer 4: a person who illegally gains access to and sometimes tampers with information in a computer system”. One of the main reasons for the high level of network security is because of the bad part of the computer hacking world.
2. How to protect yourself?
Protecting yourself is only effective if you know what you are protecting your against and how to protect. There are a couple ways to start getting you more protected. The first is installing the default operating system. This would have a default password, no security patches and no virus protection. The second thing you don’t want to do is use simple and common passwords like for example, password. In the 10 immutable laws below, one of the laws is someone is always