Network Security
Network Security
Understanding Network Security
- Network Security refers to measures taken to protect data during its transmission over a network.
- It deals with issues related to unauthorised access, unauthorised disclosure, and data integrity.
- The end goal of network security is to ensure availability, integrity, and confidentiality of data.
Elements of Network Security
- Hardware: Includes firewalls, VPN concentrators, content filters, intrusion detection systems.
- Software: Involve tools like anti-virus software, anti-spyware software and password management tools.
- Policies and procedures: These are the rules set out by an organisation to protect its data.
Types of Network Attacks
- Passive Attacks: In this type, attackers intercept transmissions without changing the content.
- Active Attacks: Here, attackers alter or manipulate the data during transmission.
- Examples of attacks include worms, viruses, trojan horses, phishing, and denial of service attacks.
Measures for Network Security
- Firewalls: Firewalls can be either software or hardware devices which control incoming and outgoing network traffic based on selected security rules.
- Anti-virus and Anti-spyware software: These software help detect, quarantine, and remove malicious software from the system
- User Authentication: Implementing strong password policies and two-factor authentication ensures only authorised users can access the network.
- Encryption: Process of transforming information so it is unreadable without a special key.
- VPNs (Virtual Private Networks): VPNs extend a private network across a public network and enable users to send and receive data as if their computing devices were connected to the private network.
Importance of Network Security
- Helps protect sensitive data from being stolen or misused.
- Provides a safe platform for computers and users to operate.
- Provides prevention against disruption of service and downtime.
- Builds trust with customers and clients that their information is safe.
- Helps prevent a system from being used in attacks on others (as in a botnet).