Security Technology: Computer & Network Security

Introduction:

Security technology is considered to be a boon in the emerging network lessons. Computer security is associated with computer technology known as information security that can be practically applied to the computers and networks. Firewall Technical IT support experts will tell you, the purpose of computer security comprises fortification of information and files from thievery, fraud, or some other natural disasters, while the information and properties are being permitted to stay accessible and prolific to its future users.

The phrase computer system security means the combined procedures and methods through which perceptive and precious information and services are secluded from publication, corrupt or disintegrate by unofficial tricks or unreliable folks and unintentional proceedings as well. The stratagem and proceedings of computer security frequently vary from the other computer technologies for the reason that it’s somewhat indefinable purpose of averting unnecessary computer performance as an alternative of facilitating required computer performance. In this piece of writing you will get a general idea of the various security technologies that are implemented in defending a computer network.  Also you will be known with the tools and expertise that are used to guard your significant information.

Computer networking:

Computer networking is related with the communications taking place between the computer systems and devices. It is associated with the abilities of exchanging data’s.

Network Topology:

The network topology describes the means in which computers, printers, and all the other associated devices are allied in physical and logical means. A network topology also portrays the design of the cables and devices as well as the path used by data transmissions.

Network topology is of two types:

§  Physical

§  Logical

The most commonly used topologies include:

§  Bus

§  Star

§  Tree (hierarchical)

§  Linear

§  Ring

§  Mesh

§  Partially Connected

§  Fully Connected (Sometimes known as Fully Redundant )

Significance of network security:

Network security is necessary to defend your information and devices like servers, routers, switches, DSL modems and many more from the illegal admittance and this has developed into the foremost concern of the petite and large firms all through the globe to put into practice a better mechanism for security.  Protecting the whole of IT communications begins from safeguarding the entry points of the network.  Defense of the network comprises client’s authentication, interruption detection, network sniff, firewall, encryption, security guidelines, corporeal protection and many more.

The majority of common network security assaults are IP spoofing, code word attacks, packet sniffers, Denial of Attacks and the routine distribution of the susceptible information to the peripheral resources.

Concept of network security:

Network security begins from legalizing the user, generally with a username and a code word. Since all that needed here is just a single thing other than the user name, i.e. the code word which is somewhat you are ‘familiar’ with, and this is occasionally named as a factor authentication. In two factor authentication the thing that you ‘have’ can also used (e.g. a security token, an ATM card, or your mobile phone), whereas with three factor authentication, thing you ‘are’ is also used (e.g. a fingerprint).

Once legalized, firewall implements access policies like the services that are permitted to be accessed by the internet users. Although it is well-organized to thwart illegal access, this particular module may also fall short to ensure potentially destructive stuffs such as computer worms or Trojans (called as viruses) that are spread over the network. Anti-virus software or an intrusion prevention system (IPS) assists in detecting and inhibiting the action of such kind of malware.  A particular system called anomaly-based intrusion detection system may also scrutinize the contents of network and traffic for unanticipated (i.e. doubtful) content or performance and other irregularity to defend resources, e.g. from refutation of service assaults or a member of staff accessing files at eccentric times. Some other events taking place on the network may also be signed for inspection reasons and for later on top level analysis. Communications that are happening between the two hosts by means of a network can be encrypted to preserve privacy.

Honey pots are the trap network-accessible resources, which could be organized in a network as observation and early-warning tools that the honey pot cannot be usually accessed. Performances used by the assailants that try to negotiate these decoy resources are deliberated at and after an assault to keep an eye on the recent utilization techniques. Also these types of analysis can also be used to extra tightened safety of the genuine network that ate being secluded by the honey pot.

Secure coding:

It has to be clearly noted that if  the working environment is not supporting  a secured operating system that is able to maintain an area for its own implementation and capable of defensive claim code from malevolent sedition, and is able to protect the system from threatening code, then elevated degrees of safety measures are obviously not possible. While these kinds of operating systems for security are probable and are implemented, most profitable methods fall in a category of ‘low security’ since they highly depend on the features  that not sustained by secure operating systems (including  portability, et al.). In the category of low security working environments, the applications have to be relied on to take part in their own fortification. There are also practices that are being followed like the ‘best effort’ coding for security that can be followed to build an application extra resistant to harmful subversion.

In the areas of commercial environments, the bulk of software agitation vulnerabilities take place from a few known kinds of coding defects. Widespread software imperfection comprises buffer overflows, format string vulnerabilities, integer overflow, and code/command injection. It has to be noted that the entire of the preceding are exact examples of a universal group of attacks, somewhere circumstances in which reputed “data” in fact contains implicit or explicit, executable commands are skillfully demoralized.

Many of the common languages including C and C++ are susceptible to all of these defects. Other languages, such as Java, are more challenging to many of these defects, but they are still prone to some of the code/command inoculation and the other software faults which assist subversion.

These days another horrific coding practice has come under inspection; dangling pointers. The first known use for this meticulous difficulty was presented the year 2007 of July.

Regrettably, there is no hypothetical replica of “secure coding” performance, nor is one virtually achievable, as far as the assortment of methods is too extensive and the etiquettes in which they can be exploited are too spotted. It is also appealing to note, though, that such vulnerabilities often takes place from ancient way of life in which computers are assumed to be only just spread things used by a selected few, all of those who are likely more educated, steadily trained academics with nil but the kindness of humanity in mind. So, it was considered a bit harmless if, for (untrue) example, a FORMAT string in a FORTRAN program may contain the J format précised to denote “shut down system after printing.” in spite of everything, who would use such an attribute but a well-qualified system programmer? It is simply away from the commencement that software could be deployed in a critical manner.

It will also be worth to note that, in some other software languages, the difference between code (in an ideal world, read-only) and data (usually read/write) is blurred. In LISP, mainly there is no dissimilarity whatever amid code and data, together taking the similar form: an S-expression can be noted as code, or data, or both, and the “user” of a LISP agenda who directs to introduce an executable LAMBDA section into reputed “data” can accomplish randomly all-purpose and hazardous functionality. Even some other thing as “modern” as Perl presents the eval () function, which facilitates one to create Perl code and put forward it to the predictor, camouflaged as string data.

Security Management:

Security Management for networks is considered to be dissimilar for all sorts of situations. A little home or any place of work would only need fundamental security where as big firms will require elevated protection and updated software and hardware to avert the malicious (virus) attacks from hack and spam.

Security for small homes:

  • A fundamental firewall or a combined risk (threat) management system.
  • For users of Windows, basic software for Antivirus. An excellent idea would be, preferring an anti-spyware program. It has to be noted that there are varieties of antivirus or anti-spyware programs that are to be considered.
  • While wireless connection is being used, make use of a healthy password. It is more vital to use the strongest protection guided by any of your wireless devices, such as WPA2 with AES encryption.
  • If using Wireless connection: modify the default SSID network identity, also hinder the SSID Broadcast; as this purpose is needless for home use. (On the other hand, many security professionals believe this to be comparatively ineffective. facilitate MAC Address filtering to maintain path of all home network MAC devices that are connecting to your router.
  • Allocate STATIC IP addresses devices of network.
  • Immobilize ICMP ping on router.
  • Analysis router or firewall logs to assist recognize irregular network connections or traffic to the Internet.
  • Make use of passwords for all of your accounts.
  • Have numerous accounts per family member, by means of non-administrative accounts for routine activities. Stop the guest account (Control Panel> Administrative Tools> Computer Management> Users).
  • Create consciousness about information security to the kids.

Security for Medium businesses

  • A practically sturdy firewall or Unified Threat Management System
  • Efficient Antivirus software and Internet Security Software.
  • For confirmation, use strongest key words and change it on a monthly or weekly basis as per your convenience.
  • When wireless connection is being used, it is better to make use of robust password.
  • Awareness about physical security has to be raised to employees.
  • Use of an elective network analyzer or network monitor will be more efficient.
  • A progressive administrator or manager is more vital.

Security for Large businesses:

  • The strongest firewall and an alternative to stay unwanted people out.
  • Antivirus software package and Internet Security Software package as well which is too strong.
  • For confirmation, it is good to use passwords that can be changed on weekly or monthly basis.
  • While wireless connection is used, it is better to use a robust password.
  • Build awareness of physical security and precautions to employees.
  • Make a module of a network analyzer or network monitor and make use it whenever needed.
  • Put into practice, the physical security management similar to the closed circuit televisions for entrance areas and classified zones.
  • Security fence to spot the perimeter of the company.
  • Use of fire extinguishers for fire-prone zones like server and security rooms.
  • Nominating Security guards help to maximize security.

Security for School:

  • An adaptable firewall and substitute to permit certified users access from the outside and inside.
  • Strongest packages of Antivirus software and Internet Security Software.
  • Wireless acquaintances that may lead to firewalls.
  • Children’s Internet Protection Act agreement (this will obviously increase security).
  • Vigilance of network to certify most recent information and changes based on popular site usage.
  • Regular administration by teachers, librarians, and managers to assure the protection against assault by both internet and sneaker net sources.

Security for Large government:

  • An efficient firewall and proxy to retain the unwanted people out.
  • Powerful suites of Antivirus software and Internet Security Software.
  • Powerful encryption.
  • White list certified wireless connection.
  • The entire network hardware is in safe zones.
  • Privacy of network of all hosts that makes it invisible from the outside.
  • Locate web servers in a DMZ, or a firewall from both the outside and from the inside.
  • Setting wireless range and building security fence to spot the perimeter of the company.

Advantages of internet security:

Each computer all round the globe requires appropriate and the most recent internet security so as ensure its safety while it is linked to the internet. The internet is the dwelling place to an enormous number of viruses and threats that are planned to disturb your computer and harm your files.

To fight against this and to ensure protected use of computers that are coupled to the internet, if you are a person, a small firm or a large business organization, you require internet and hardware security for your equipments. Fortunately today, these days there are organizations that provide solutions to defend networks from unlawful and destructive intrusions. One of the most important contributor of such security features are Sonic WALL, who have precious experience in the stipulation of complicated and wide-ranging security solutions.

Ensuring security to a system is one of the greatest advantages. If a network has more number of users and all of those who need internet access for the period of their working hours, the network obviously needs security so the users do not unintentionally initiate a virus to the network.

Next to it, security systems like those offered by Sonic WALL can offer a steady log of all actions that are occurring on each of the individual machine. This highly supports the IT branch examine the users to prevent any probable abuse internally.

With the latest expansion in firewall software, they are now skilled in capturing incoming viruses as well as tracking any of the user’s activity from within the network. All these advantages make organizing the network in a protected manner extreme easier. It is advised to check out Sonic WALL for additional benefits to network security.

Disadvantages of internet security:

Internet Security suites are dangerously system hogs. It clearly means that most suites use a lot of your RAM memory and in turn causes your CPU to work almost at its maximum and that is the reason when you attempt to do something else like watch a motion videos on YouTube your computer goes slow. On the other hand AVG makes it great job in the memory that it uses to run. It runs too slow. Abnormalities are very uncommon and at most of the times any system collides may be caused by other programs stalling or not reacting. Thus it is made so clear that the entire AVG internet security has no chief or outstanding drawback.

Applications:

Computer security is serious in about any technology-based industry which functions on computer systems. Computer security can also be identified as computer safety. The problems of computer based systems and taking in hand their countless weakness is an essential part of preserving an operational industry.

Cloud Computing Security

 Cloud computing Security
Computer security in the cloud is demanding owing to wide-ranging degree of security features and management methods within the cloud entities. Here all that which is needed is a connection of a logical protocol base so that the whole gamet of mechanism functions synchronously and firmly.

In Aviation

computer security aviation
The aviation industry is considered to be more important when considering computer security since the mixed up risks include human life, expensive equipment, cargo, and transportation infrastructure. Security can be negotiated by hardware and software misconduct, human mistakes, and defective operating environments. Threats that exploit computer vulnerabilities can stem from damage, espionage, industrial rivalry, terrorist assault, mechanical breakdown, and human error.

Conclusion:

Thus it is very clear from the above discussion that internet security is more important to ensure safety to your system. And it is obvious that the internet security technologies are offering better solutions for both the large and the small corporate including the machines at home.

Leave a Comment