Network Security

Network security involves all activities that organizations, enterprises, and institutions undertake to protect the value and ongoing usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them.

Threats to Network Security Include:

Viruses : Computer programs written by devious programmers designed to replicate themselves and infect computers when triggered by a specific event.

Trojan Horse Programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games.

Vandals : Software applications or applets that cause destruction.

    Attacks :
  • Reconnaissance Attacks - Information-gathering activities to collect data that is later used to compromise networks.
  • Access Attacks - Which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network.
  • Denial-of-service Attacks - Which prevent access to part or all of a computer system.

Data Interception : Involves eavesdropping on communications or altering data packets being transmitted.

Social Engineering : Obtaining confidential network security information through nontechnical means, such as posing as a technical support person and asking for people's passwords

the word security on a screen

Network Security Tools Include:

Antivirus Software Packages : These packages counter most virus threats if regularly updated and correctly maintained.

Secure Network Infrastructure : Switches and routers have hardware and software features that support secure connectivity, perimeter security, intrusion protection, identity services, and security management. Dedicated network security hardware and software-Tools such as firewalls and intrusion detection systems provide protection for all areas of the network and enable secure connections.

Virtual private networks : These networks provide access control and data encryption between two different computers on a network. This allows remote workers to connect to the network without the risk of a hacker or thief intercepting data.

Identity services : These services help to identify users and control their activities and transactions on the network. Services include passwords, digital certificates, and digital authentication keys.

Encryption : Encryption ensures that messages cannot be intercepted or read by anyone other than the authorized recipient.

Security management : This is the glue that holds together the other building blocks of a strong security solution.

None of these approaches alone will be sufficient to protect a network, but when they are layered together; they can be highly effective in keeping a network safe from attacks and other threats to security. In addition, well-thought-out corporate policies are critical to determine and control access to various parts of the network.

ComNets Consulting Corp. can help you to design a custom made solution to protect your network...

Contact Information

Phone Number (305) 519-4199
Email info@comnetscorp.net