Connected computers create a network. The invention of networks revolutionized the way people interacted. As computers increased in usage, people were able to communicate more quickly, leading to faster advancements in science and technology. With the invention of networks, evil doers were also created, we’ll get to them in a moment.
Networks are setup using different kinds of equipment to connect different devices. According to IBM, networks are made up of different devices like routers, bridges, switches, and hubs (What are the basic elements of a network, 2010). While the normal home network may just involve a router and modem, larger organizations will use all the different devices mentioned. Each performs a task in connect devices to a local network and then to a larger network like the internet. Network security begins with choosing how to protect these devices, especially the router, as these devices are the entry points into the network. According to Paloalto Networks, having a good IT Security policy, the document underlining who and how the network is secured, is one of the most critical was of protecting a network (What is network security, 2019b). There needs to be both physical and digital security. The physical devices need to be kept where only the authorized employees will have access. Digitally, the devices need to be secured using some form of authentication to ensure only the authorized, trained employees have access to such critical systems.
To protect networks from digital attacks, different applications are used to monitor incoming and outgoing data. The first line of defense is the firewall. There are different applications that produce a firewall, but all essentially perform the same way. The firewall checks traffic coming into the network to make sure it’s legitimate if not the traffic is stopped. Firewalls also check traffic leaving to make sure it’s headed somewhere safe. Other applications monitor the different processes running on the computers attached to the network. These applications check to make sure no malicious programs are being used to send private data out of the network.
Just like networks need to be secured, databases do too. Databases may hold large amounts of private data and can be particularly interesting for crooks. Databases should be secured by digitally, like networks, by monitoring requests for information coming in and out to make sure nothing nefarious is taking place. As mentioned above, firewalls will protect the database servers from outside intrusion.
As mentioned above, a network is made up of different devices. The image below displays a network architecture, showing where data moves between connected devices and then out into the internet. Due to the number of connected devices, it's apparent that network security should be at the top of mind. There is so much confidential data flowing through the network, and one weak point exposes that data to people with terrbile intentions. With a strong IT security policy and an employee understanding of how networks work and the different types of potential threats, networks can stay secure and keep private data from the nefarious people out there.
[Network Architecture, 2018]
References
[Network Architecture]. (2018). Retrieved February 14, 2019, from http://ownself.me/network-architecture-diagram/a-basic-enterprise-lan-network-architecture-block-diagram-and/
Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/
What are the basic elements of a network? (2010). Retrieved February 13, 2019, from https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.znetwork/znetwork_14.htm
What is network security? (2019). Retrieved February 12, 2019, from https://www.cisco.com/c/en/us/products/security/what-is-network-security.html
What is network security? (2019). Retrieved February 12, 2019, from https://www.paloaltonetworks.com/cyberpedia/what-is-network-security
No comments:
Post a Comment