Network security is an integral part of computer
networking, regardless of whether the network is limited to a home
environment with a single connection to the Internet or as large as a
corporation with thousands of users. The network security that is
implemented must take into account the environment, as well as the tools
and requirements of the network. It must be able to secure data while
still allowing for the quality of service that is expected of the
network.
Securing a network involves protocols, technologies, devices, tools, and techniques to secure data and mitigate threats. Threat vectors may be external or internal. Many external network security threats today are spread over the Internet.
The most common external threats to networks include:
It is equally important to consider internal threats. There have been many studies that show that the most common data breaches happen because of internal users of the network. This can be attributed to lost or stolen devices, accidental misuse by employees, and in the business environment, even malicious employees. With the evolving BYOD strategies, corporate data is much more vulnerable. Therefore, when developing a security policy, it is important to address both external and internal security threats.
Securing a network involves protocols, technologies, devices, tools, and techniques to secure data and mitigate threats. Threat vectors may be external or internal. Many external network security threats today are spread over the Internet.
The most common external threats to networks include:
- Viruses, worms, and Trojan horses - malicious software and arbitrary code running on a user device
- Spyware and adware - software installed on a user device that secretly collects information about the user
- Zero-day attacks, also called zero-hour attacks - an attack that occurs on the first day that a vulnerability becomes known
- Hacker attacks - an attack by a knowledgeable person to user devices or network resources
- Denial of service attacks - attacks designed to slow or crash applications and processes on a network device
- Data interception and theft - an attack to capture private information from an organization’s network
- Identity theft - an attack to steal the login credentials of a user in order to access private data
It is equally important to consider internal threats. There have been many studies that show that the most common data breaches happen because of internal users of the network. This can be attributed to lost or stolen devices, accidental misuse by employees, and in the business environment, even malicious employees. With the evolving BYOD strategies, corporate data is much more vulnerable. Therefore, when developing a security policy, it is important to address both external and internal security threats.
0 comments:
Post a Comment