Is Your Network Secure? - Neuroon Networks

Breaking

Wednesday, February 14, 2018

Is Your Network Secure?

Is Your Network Secure?
What is a Network?
Network is a connection with two or more computers through wireless or wires. Regarding to computer networks there must be a security protocol for it. Network Security is a strategy and provisions for ensure the security of assets and all network traffic. Network security consists with both hardware and software security implementations.
The IT Security Policy is the principle document for network security. Network security begins with
 authenticating. Authenticating means accessing the network. For this there must be user name and password. 
Some networks will only need the password or fingerprint or etc. When authenticating an intrusion preventing 
system(IPS) will check whether there are harmful malwares such as worms, Trojans accessing the network.
An anomaly-based intrusion detection system can also monitor Wireshark traffic and can also logged for audit purposes. As well as Honeypot is another secure tool for networks. Normally honeypot can direct an attacker away from the original server. Actually, honeypot let attackers to attack on the decoy server, which is not the real server. Same to honeypot, honeynet (contains one or more honeypots) is a network set up with intentional vulnerabilities. They also let attackers to attack and then they can learn the methods which attackers used to attack and increase the network security by studying them.
Security management for Network Security is different one to another. Actually, a home or a small office
 may require only basic security protocols. But for large companies may require high maintenance and more
 advanced hardware security protocols and software security protocols to prevent from malwares, 
spamming and hacking.

Networks can be attacked in two different ways. One is “Passive” attack. It means when a network intruder
 intercepts data traveling through the network. The another attacking method is “Active” attack. It means which 
an attacker initiates commands to disrupt the network’s normal operation or gain access to asserts in the 
network.
Examples :
Passive
  • Network – Wiretapping, Port scanner, Idle scan, Encryption, Traffic Analysis
Active
  • Virus
  • Eavesdropping
  • Data Modification – Denial-of-service attack, Heap overflow, DNS spoofing, Format string attack, Man in 
    the middle, SQL injection, ARP poisoning, Phishing, VLAN hopping, Cross-site-scripting, Smurf attack,
    CSRF, Buffer overflow, Cyber-attack

References : https://en.wikipedia.org/wiki/Network_security

No comments:

Post a Comment