to Apply Network Security ?
security is the most important job description of the
network administrators and it consists of the network
infrastructure, security templates, policies and the
configurations by the network administrators. Computer
network security can be applied by two ways i.e. from
the computer server and the computer itself. There are
a lot of known threats to the network users such as
viruses, spyware, hackers’ attacks, Trojan horses,
denial of server, hidden files extensions, email spoofing,
physical theft and unauthorized access to the network
resources. To deal with these internal and external
threats a lot of security policies are need to be implemented
on the computer network.
the computer networks is to secure the entry points
of a network. The gateway computer needs to be secure
from all aspects because it is directly exposed to the
internet. If the network entry point is secured then
the possible attacks can be stopped. Following steps
will guide you to secure your computer network.
online computer can be attacked by the viruses, spyware
and other security threats if not proper security mechanism
and antivirus software has been installed and configured.
To protect your LAN /WAN computer network, you need
to install an up-to-dated antivirus program both on
the network server and the client computer. Antivirus
software will provide defensive layer against the known
internet threats. The most common antivirus solutions
are provided by the Symantec, McAfee, Trend Micro and
the viruses, the spyware is also the main threat to
the online and offline users. To deal with the spyware
you need to install the up-to-dated anti spyware program
to all the computers in a computer network. The security
solution providers like Symantec, McAfee and Panda provides
the complete suite of security that includes the antivirus
program, anti spyware and firewall system.
detection system deals with the threats to the IT assets
such as computer, computer networks, databases and other
network resources and devices.
Firewall is a protective boundary and line of defense
for a computer network. A network without a proper firewall
system can be attacked by the hackers and unauthorized
users and once they enter in the computer network they
can perform any unwanted actions like stealing the confidential
data, attacking the network with viruses and spyware
etc. Every computer in a network especially the gateway
computer should have proper firewall software installed
and configured. By default, Windows XP Professional
provides the built-in firewall features. Network administrator
can configure the firewall at any desired level, according
to the security requirements of the network. You can
block and allow any IP request with the firewall system.
The other third party firewall software includes Zonealrm,
Personal Firewall, Prisma Firewall, Comodo Firewall
Pro 3, Secure Point Personal firewall and VPN client.
attacks are used by the hackers to steal the customer’s
personal information including financial data and credit
card’s information. The most common methods of
the phishing attacks are through the emails and messengers.
The best way to avoid the phishing attacks is not to
open the emails from unknown locations. The common software
that are used against the phishing attacks are Spamfighter,
Norton Internet Security, McAfee Total Protection and
policies are the foundation of information security
in an organization. By default Windows servers such
as Windows 2000 Server and Windows 2003 Servers provides
a lot of security features, policies and permissions.
There are default security templates, which can be applied
to all the network users, computer or a single computer
important aspect to deal with the external security
threats is to increase the security level of the browsers.
security is preventive measure that is used to protect
the network resources from the unauthorized access.
Never leave your server room unattended and only authorized
users should be allowed to enter in the server room.
Use strong password for the network administrator user
account and make one additional account of the network