Thursday, February 14, 2019

Blog Post 7 - Understanding Network Security

I chose to write about network security, what it means and how to implement features to protect a network. Throughout our course and text, we’ve discussed the concept of information technology. Networks play a major role in IT. Whether it’s a personal home network, connecting a couple of computers to a printer, or something larger such as a major organization’s network of computers, or even bigger, the World Wide Web, all networks require some form of security. According to Cisco, “network security combines multiple layers of defense at the edge and in the network” (What is network security, 2019a). Our text discussed the different types of attacks computers can face, such as DDOS attacks, malware attacks, and trojans (Vahid & Lysecky, 2017). These types of attacks, as well as others, can go undiagnosed or prevented based on the level of security in place for each network.



Connected computers create a network. The invention of networks revolutionized the way people interacted. As computers increased in usage, people were able to communicate more quickly, leading to faster advancements in science and technology. With the invention of networks, evil doers were also created, we’ll get to them in a moment.

Networks are setup using different kinds of equipment to connect different devices. According to IBM, networks are made up of different devices like routers, bridges, switches, and hubs (What are the basic elements of a network, 2010). While the normal home network may just involve a router and modem, larger organizations will use all the different devices mentioned. Each performs a task in connect devices to a local network and then to a larger network like the internet. Network security begins with choosing how to protect these devices, especially the router, as these devices are the entry points into the network. According to Paloalto Networks, having a good IT Security policy, the document underlining who and how the network is secured, is one of the most critical was of protecting a network (What is network security, 2019b). There needs to be both physical and digital security. The physical devices need to be kept where only the authorized employees will have access. Digitally, the devices need to be secured using some form of authentication to ensure only the authorized, trained employees have access to such critical systems.

To protect networks from digital attacks, different applications are used to monitor incoming and outgoing data. The first line of defense is the firewall. There are different applications that produce a firewall, but all essentially perform the same way. The firewall checks traffic coming into the network to make sure it’s legitimate if not the traffic is stopped. Firewalls also check traffic leaving to make sure it’s headed somewhere safe. Other applications monitor the different processes running on the computers attached to the network. These applications check to make sure no malicious programs are being used to send private data out of the network.

Just like networks need to be secured, databases do too. Databases may hold large amounts of private data and can be particularly interesting for crooks. Databases should be secured by digitally, like networks, by monitoring requests for information coming in and out to make sure nothing nefarious is taking place. As mentioned above, firewalls will protect the database servers from outside intrusion.

As mentioned above, a network is made up of different devices. The image below displays a network architecture, showing where data moves between connected devices and then out into the internet. Due to the number of connected devices, it's apparent that network security should be at the top of mind. There is so much confidential data flowing through the network, and one weak point exposes that data to people with terrbile intentions. With a strong IT security policy and an employee understanding of how networks work and the different types of potential threats, networks can stay secure and keep private data from the nefarious people out there.





[Network Architecture, 2018]






References


[Network Architecture]. (2018). Retrieved February 14, 2019, from http://ownself.me/network-architecture-diagram/a-basic-enterprise-lan-network-architecture-block-diagram-and/

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

What are the basic elements of a network? (2010). Retrieved February 13, 2019, from https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.znetwork/znetwork_14.htm

What is network security? (2019). Retrieved February 12, 2019, from https://www.cisco.com/c/en/us/products/security/what-is-network-security.html

What is network security? (2019). Retrieved February 12, 2019, from https://www.paloaltonetworks.com/cyberpedia/what-is-network-security

No comments:

Post a Comment