Posts

Showing posts with the label Doing What’s Right to Protect Your Network

 

Doing What’s Right to Protect Your Network

The protection of personal data, software, and hardware is the essential goal of network security. Individuals and organizations must develop and maintain effective measures to maintain operability and protect information within computers and networks. I am pursuing a bachelor of science in cyber and data security technology so that I can help save people and organizations' privacy and livelihoods.

Until recent years, network security had not been as vital as it is today. Computers were not networked before 1980 due to the lack of technology. Back then, serial ports utilizing RS-232 protocols allowed users to interface with the mainframe through physically connected terminals to ports. Systems were utterly vulnerable because they were wide open; security was not considered necessary due to an emphasis on ease of connectivity and access. Nowadays, a single network circuit can deliver thousands of connections, and it is imperative to implement preventative measures that can prevent a security breach.

Network security is compromised on a foundation of prevention, detection, and response—the use of security policies and measures by which an individual or organization develops and deploys, prevents exploitation of vulnerabilities and deters potential attackers. Many techniques, devices, and technologies provide rules and configurations to identify problems to protect a system's network and data. Individuals and organizations have different determined levels of security that are individually adequate for them. Information security is considered all of the following: integrity, confidentiality, authentication, and availability. Simple policies and procedures that protect information security are data integrity, backups—disaster recovery, configuration, and media controls.

The cost-benefit analysis of a compromised network can determine how much one should invest in security safeguards. The cost to implement network security measures can be based on the risk and impact of lost data and information. Three approaches mainly used in network security are defense-in-depth, obscurity, and perimeter defense. Perimeter defense uses firewalls to protect against untrusted networks and cannot protect against an internal attack. A defense-in-depth requires a combination of all network administrators to harden and monitor all systems. With this model, an internal network system is better equipped to defend against a compromised external system like a modem and better protection against an internal attack. The concept of security by obscurity is in stealth protection. By hiding a network or system, the ability to be attacked is decreased. Although, if detected, the network or system is entirely vulnerable.

Some software and hardware, though design flaws, can allow a system to become vulnerable and hacked. Once a hacker gains access, a local exploit increases the privileges of the intruder to a system's network. Another form of exploitation is a computer worm which is self-contained and replicated. A computer can become easily infected by a virus with the opening of an email attachment. Some computers can recover within a few days or weeks but most never recover.

 A combination of multiple layers of defense can protect a network's security. These layers allow authorized users to access the network and block malicious threats. The risk of being hacked or attacked is reduced by implementing simple and basic procedures: replace outdated computer systems, keep firewalls on, update all devices to the latest and available firmware, add spam filters and antivirus/antimalware software, use hacker-proof passwords and multi-factor authentication, use a virtual private network, limited access control, wireless security, backup regularly, and have a disaster recovery plan.  

All lives will be affected by the evolving and continued growth of information technology. Network security is vital due to the increasing interdependency of the internet and software. One can become overwhelmed and think that network security is not possible, but by implementing basic security measures, a computer's network system can be better protected against potential malicious attacks.