Sunday, August 22, 2010

Networking security?

Can anyone tell me what networking security is and go into detail and how it can be obtained?

Networking security?
Network security involves practices that reduce the risk of having information get into the wrong hands or preventing unwanted programs or individuals from distrupting your quality of service. This can be achieved in three ways


- Physical Security


- Application Security


- Hardware Security.





Physical trying to limit physical access to a computer or networking devices. This can be done by housing critical devices in areas that few people have knowledge, requires keys, or smart card access.





Hardware security reflects on networking devices such as routers and firewalls that have builtin virus scanners or access rules. Access rules are a defined list of both allowed and not allowed activities or programs. Similar to a bouncer at a bar, they inspect everything that goes in or out. Some also act as honey pot which pretends to be computer or server and will act as a scout that will alarm the adminstrator of possible threats. Some devices are advanced enough to offer hardware based encryption or reroute traffic when a threat is found.





Application Security mostly deals with access permissions or group policies, encryption and programs located on a computer or server. Firewalls , antispam, spyware or virus scanners are the common tools that will be found at this level. Along with having a physical firewall scanners and encryption, application based solutions are needed because one level miss a threat. For example if a threat originates from within a network, considerable damage could of occured before its isolation with out the additional application layer.


Group policies and access permissions are in some ways similar to a firewall. Not only do they have a list of which activities or programs are permitted, but depending on restrictions, they can deny access to files or certain tasks on a computer such as changing the system date or installing software. Finally, a true secure network environment is totally isolated meaning no network connection or physical access that simple. But that's not practical so have these three layers is must.
Reply:With respect to the details, you can google and do your own research. But generally, most of us want to keep out networks secure so no one else can use our bandwidth or otherwise get into our networks.





To secure your own network, read the users manual that came with your router, then call the manufacturer of your router and chances are they have some shortcuts for you. At least the great Cisco folks at Linksys do.





Good Luck


No comments:

Post a Comment