Sunday, 27 July 2014

Security in Network's security



Network Perimeter security - Once we have confidence in our network installation, we need to define security perimeters, which will be divided by one or more firewalls. The simplest configuration is to only put a firewall between your local network and our departure to the Internet, allowing input and output connections to authorize. However, this configuration is very simplistic. For an important medium complexity and network, it is required to have at least the following delimited perimeters:
·         - Servers for internal use
·         - Servers for external use
·         - LAN
·         - wireless Network
The power granularly control access between areas will give them a great flexibility in defining the rules of packet filtering, greatly increasing the security of your network. It is important to remember that the majority of attacks, both intentional and unintentional, that suffers any organization tend to come from inside of it. Constantly monitor the network: An important part of network security is to actively monitor it. There are many conditions that can lead to failure, and very easy to correct. We can use free tools like MRTG, which gives us a -daily, weekly, monthly and annually data graphical report that he's set. Another important aspect is to monitor attempted attacks that we are getting to know how to protect ourselves, what our major risks, who is trying to attack us, by what means, and what they seek. To do this, we can install intrusion detection systems. Webimprints is a network security company that provides customized solution to secure organizations.

http://www.webimprints.com/information-security.html

The installation of our network may have been very safe. We can have firewalls defining each specific area. However, if we do not maintain our current operations, systems software and tools, our network cannot be considered safe. It is very common in both free and proprietary software that are found programming flaws that can lead to security holes - responsible network administrator must keep their systems up to date with patches, not to suffer preventable attacks.

Most wireless networks today are based on the IEEE 802.11b specification, which is equivalent to a standard Ethernet network over a wireless medium, so the answer to this question is not limited to wireless networks. In an Ethernet network, the media (either cable or space in the electromagnetic spectrum) is shared between all the computers that make up a segment. This means that when any computer wants to send a packet to any other, you must first make sure that no other computer is using the network. This mechanism comes under the part of CSMA / CD (Carrier Sense Multiple Access / Collision Detect). Wireless being a part of network, Webimprints also provides wireless security solutions to organizations. Posted by Webimprints.

No comments:

Post a Comment