Network Security Basics


What is network security?

Network security is the process of securing the network infrastructure from unauthorized access. Nowadays everyone relies on the internet to carry out personal and professional tasks, but have you stopped to think if your network is secure? Some people out there want to attack computers connected to the internet, therefore If you fail to take necessary steps to prevent this from happening, your privacy will be violated. Businesses use a network of computers to carry out day to day tasks, As a result, network security has become a main topic in cyber security resulting in implementing network security measures for businesses to perform their day to day tasks in a secure environment.

What is a network attack?

A network attack is a method used to maliciously attempt to compromise network security, Firstly let’s look at the types of network attacks.

  1. Active attacks
  2. Passive attacks

Active attacks

In an active attack, the attacker will try to change the data transferring over a network. For example: If you send a message to your friend via a network which is not secure, then there can be more people in this network, In other words You, your friend and the attacker. As a result, the Attacker has the ability to change the content in your message.

  • The original message – I want to meet you.
  • Edited message          – I don’t want to meet you.

Therefore, Active attacks are aggressive attacks.

Passive attacks

A passive attack involves the attacker monitoring the system without any affect to the system resources. For instance: You are sending a message to your friend through a network which is not secure against attacks, however, an attacker who is in the same network as you and your friend can see the message. If you send any sensitive information such as bank account details then the attacker can collect the information. Therefore, The purpose of a passive attack is to gain access to the system without detection.

Types of network security

There are a many components to a network security system so Let’s discuss about some of them.

  • Access control -> It’s important to block the unauthorized users and devices from accessing the network, Therefore only provide access only to the employee who is assigned to carry out network related tasks.
  • Application Security -> Application security is detecting vulnerabilities in software, hardware to ensure the security of your network.
  • Firewalls -> A firewall can be hardware, software or both. Firewall controls the traffic in a network, so It acts like a gatekeeper. As a result, A firewall can block unauthorized users from accessing the network.
  • Virtual private networks -> VPN can encrypt the connect from an endpoint to a network (The internet) so It creates a secure encrypted tunnel across the internet.
  • Behavioral Analytics -> IT executives who monitor the network behavior should know what normal behavior looks like since they should detect suspicious network behavior and take necessary actions to block attackers. They can use behavioral analytics tools to automatically analyze suspicious network behavior.
  • Wireless security -> Wireless networks are not secure, as a result Cybercriminals usually targets mobile devices, Therefore, You have to make sure which devices have access to the network.
  • Intrusion prevention systems -> These systems have the ability to scan network traffic and identify attacks, Additionally, the system has access to the databases of known attack techniques which is used to identify attacks.

These are the fundamentals of network security but Let’s dive deeper into this topic in another article.

References

1.Edureka. (2018). What is Network Security | Fundamentals of Network Security. [online] Available at: https://www.edureka.co/blog/what-is-network-security/#NetworkSecurity [Accessed 6 Mar. 2020].

2. www.guru99.com. (n.d.). Types of Computer Networks: LAN, MAN, WAN, VPN. [online] Available at: https://www.guru99.com/types-of-computer-network.html.

3.Comtact (n.d.). The causes of network downtime: What are they!? [online] www.comtact.co.uk. Available at: https://www.comtact.co.uk/blog/the-causes-of-network-downtime.

Do you want to read more on this topic? Check out these articles:

Shazni Mursaleen

Recent Posts

Embracing Emerging Technologies: From Risks to Rewards

Source: https://www.cio.com/article/3550265/from-risk-to-reward-mastering-the-art-of-adopting-emerging-technologies.html  Innovation in technology can feel like a double-edged sword. On one side, groundbreaking…

3 weeks ago

Staying Ahead in a Rapidly Disruptive World with Emerging Technologies

Source: https://aws.amazon.com/blogs/enterprise-strategy/how-executives-can-avoid-being-disrupted-by-emerging-technologies/  In a world of constant technological evolution, businesses face the challenge of navigating…

3 weeks ago

The Transformative Impact of Emerging Technologies on Our Lives

Source: https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2024/volume-17/emerging-technology-key-challenges-and-opportunities  Teens doing experiments in robotics in a laboratory. Boy in protective glasses using…

3 weeks ago

The New Essential Eight Technologies: What You Need to Know (Part 2)

n the first part of this series, we explored the transformative potential of Artificial Intelligence…

3 weeks ago

The New Essential Eight Technologies: What You Need to Know (Part 1)

Source: https://www.pwc.com/us/en/tech-effect/emerging-tech/essential-eight-technologies.html As businesses embrace digital transformation, emerging technologies play a pivotal role in shaping…

3 weeks ago

Emerging Technologies Shaping the Future of Business

Source: https://www.gartner.com/en/articles/30-emerging-technologies-that-will-guide-your-business-decisions  As businesses navigate an ever-evolving technological landscape, emerging technologies have the potential to…

3 weeks ago