Search
  • Admin

Network Security Basics


What is network security?

Network security is the process of securing the network infrastructure from unauthorized access. Nowadays everyone relies on the internet to carry out personal and professional tasks? Do you think your network is secure?

Some people out there want to attack your computers which are connected to the internet. If you failed to take necessary steps to prevent this from happening, your privacy will be violated. Businesses use a network of computers to carry out day to day tasks. Because of that, network security has become a main topic in cyber security so implementing network security measures allows businesses to perform their day to day tasks in a secure environment.




What is a network attack?

A network attack is a method used to maliciously attempt to compromise network security. Now let’s look at types of network attacks.

1.Active attacks

2.Passive attacks


Active attacks

In an active attack attacker will try to change the data which transfer over a network. Let’s look at an example.

If you send a message to your friend via a network which is not secure against attacks, there are three people in this network. You, your friend and the attacker. Attacker has the ability to change the content in your message.


  • The original message- I want to meet you.

  • Edited message          - I don’t want to meet you.


Active attacks are aggressive attacks.


Passive attacks

In a passive attack, attacker just monitors the system, but does not affect system resources. Let’s look at an example.

You are sending a message to your friend network which is not secure against attacks. The attacker who is in the same network as you and your friend can see the message. If you send sensitive information such as bank account details, attacker can collect the information. The purpose of a passive attack is to gain access to the system without detection.


Types of network security

There are a many components to a network security system. Let’s discuss about some of them.

  • Access control -> It’s important to block the unauthorized users and devices from accessing the network. Give access only to the employee who is assigned to carry out network related tasks.

  • Application Security -> Application security is detecting vulnerabilities in software, hardware to ensure the security of your network.

  • Firewalls -> A firewall can be hardware, software or both. Firewall controls the traffic in a network. It acts like a gatekeeper. A firewall can block unauthorized users from accessing the network.

  • Virtual private networks -> VPN can encrypt the connect from an endpoint to a network ( The internet). It creates a secure encrypted tunnel across the internet.

  • Behavioral Analytics -> IT executives who monitor the network behavior should know what normal behavior looks like. They should detect suspicious network behavior and take necessary actions to block attackers. They can use behavioral analytics tools to automatically analyze suspicious network behavior.

  • Wireless security -> Wireless networks are not secure. Cybercriminals usually targets mobile devices. You have to make sure which devices have access to the network.

  • Intrusion prevention systems -> These systems have the ability to scan network traffic and identify attacks. System has access to the databases of known attack techniques. The system use that to identify attacks.

So these are fundamentals of network security. Let’s go deep into this topic from another article.

References

1.Edureka. (2018). What is Network Security | Fundamentals of Network Security. [online] Available at: https://www.edureka.co/blog/what-is-network-security/#NetworkSecurity [Accessed 6 Mar. 2020].



2. www.guru99.com. (n.d.). Types of Computer Networks: LAN, MAN, WAN, VPN. [online] Available at: https://www.guru99.com/types-of-computer-network.html.


3.Comtact (n.d.). The causes of network downtime: What are they!? [online] www.comtact.co.uk. Available at: https://www.comtact.co.uk/blog/the-causes-of-network-downtime.






27 views

© 2020 Powered by CSG Technologies

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram