Network Perimeter
security - Once we have confidence in our network installation, we need to
define security perimeters, which will be divided by one or more firewalls. The
simplest configuration is to only put a firewall between your local network and
our departure to the Internet, allowing input and output connections to authorize.
However, this configuration is very simplistic. For an important medium
complexity and network, it is required to have at least the following delimited
perimeters:
· - Servers for internal use
·
- Servers for
external use
· - LAN
· - wireless Network
The power
granularly control access between areas will give them a great flexibility in
defining the rules of packet filtering, greatly increasing the security of your
network. It is important to remember that the majority of attacks, both
intentional and unintentional, that suffers any organization tend to come from
inside of it. Constantly monitor the network: An important part of network
security is to actively monitor it. There are many conditions that can lead to
failure, and very easy to correct. We can use free tools like MRTG, which gives
us a -daily, weekly, monthly and annually data graphical report that he's set.
Another important aspect is to monitor attempted attacks that we are getting to
know how to protect ourselves, what our major risks, who is trying to attack
us, by what means, and what they seek. To do this, we can install intrusion
detection systems. Webimprints is a network
security company that provides
customized solution to secure organizations.
The installation of
our network may have been very safe. We can have firewalls defining each
specific area. However, if we do not maintain our current operations, systems
software and tools, our network cannot be considered safe. It is very common in
both free and proprietary software that are found programming flaws that can
lead to security holes - responsible network administrator must keep their systems
up to date with patches, not to suffer preventable attacks.
Most wireless
networks today are based on the IEEE 802.11b specification, which is equivalent
to a standard Ethernet network over a wireless medium, so the answer to this
question is not limited to wireless networks. In an Ethernet network, the media
(either cable or space in the electromagnetic spectrum) is shared between all
the computers that make up a segment. This means that when any computer wants
to send a packet to any other, you must first make sure that no other computer
is using the network. This mechanism comes under the part of CSMA / CD (Carrier
Sense Multiple Access / Collision Detect). Wireless being a part of network,
Webimprints also provides wireless security solutions to organizations. Posted
by Webimprints.
No comments:
Post a Comment