Network security consists of the
provisions and policies adopted
by a network administrator to prevent and monitor unauthorized access,
misuse, modification, or denial of a computer networkand
network-accessible resources. Network security involves the authorization of
access to data in a network, which is controlled by the network administrator.
The
networks are computer networks, both public and private, that are used every
day to conduct transactions and communications among businesses, government
agencies and individuals. The networks are comprised of "nodes",
which are "client" terminals (individual user PCs) and one or more
"servers" and/or "host" computers. They are linked by
communication systems, some of which might be private, such as within a
company, and others which might be open to public access. The obvious example
of a network system that is open to public access is the Internet, but many
private networks also utilize publicly-accessible communications.
Network
security involves all activities that organizations, enterprises, and
institutions undertake to protect the value and ongoing usability of assets and
the integrity and continuity of operations. An effective network security
strategy requires identifying threats and then choosing the most effective set
of tools to combat them.
Threats
to network security include:
Viruses
: Computer programs written by devious programmers and designed to replicate
themselves and infect computers when triggered by a specific event
Trojan
horse programs : Delivery vehicles for destructive code, which appear to be
harmless or useful software programs such as games
Vandals
: Software applications or applets that cause destruction
Attacks
: Including reconnaissance attacks (information-gathering activities to collect data that is later used to
compromise networks); access attacks (which exploit network vulnerabilities in
order to gain entry to e-mail, databases, or the corporate network); and denial-of-service
attacks (which prevent access to part or all of a computer system)
Data
interception : Involves eavesdropping on communications or altering data
packets being transmitted
Social
engineering : Obtaining confidential network security information through
nontechnical means, such as posing as a technical support person and asking for
people's passwords
Network
security tools include:
Antivirus
software packages : These packages counter most virus threats if regularly
updated and correctly maintained.
Secure
network infrastructure : Switches and routers have hardware and software
features that support secure connectivity, perimeter security, intrusion
protection, identity services, and security management.
Dedicated
network security hardware and software-Tools such as firewalls and intrusion
detection systems provide protection for all areas of the network and enable
secure connections.
Virtual
private networks : These networks provide access control and data encryption
between two different computers on a network. This allows remote workers to
connect to the network without the risk of a hacker or thief intercepting data.
Identity
services : These services help to identify users and control their activities
and transactions on the network. Services include passwords, digital
certificates, and digital authentication keys.
Encryption
: Encryption ensures that messages cannot be intercepted or read by anyone
other than the authorized recipient.
Security
management : This is the glue that holds together the other building blocks of
a strong security solution.
Referensi:
- · http://en.wikipedia.org/wiki/Network_security
- · http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/secure_my_business/what_is_network_security/index.html
- · http://www.paloaltonetworks.com/
- · http://www.cc.boun.edu.tr/network_security.html
- · http://www.sophos.com/en-us/security-news-trends/security-hubs/network-security.aspx
- · http://www.networksecurity.ie/
- · http://www.linkedin.com/skills/skill/Network_Security
- · http://www.sourcefire.com/security-technologies/network-security
- · http://www.brocade.com/solutions-technology/enterprise/network-security/index.page
- · http://telconetworksecurity.com/
Tidak ada komentar:
Posting Komentar