Since the increased popularity of the Internet, we began using our computers for a wide range of tasks than ever. At home, we buy our food, do our banking, buy birthday gifts, send e-mail communications, writing our life story in social networks at work, our companies offer a through e-commerce Web sites, send and receive personal e-mails, phone calls and videoconferencing are made through the IP network, everything is done online and would be a serious security threat if n If not for the fact that we have several security measures us. I refer to some basic examples of how the safety net to help us stay safe online, whether at home or at work.
Any network of computers used for business must employ best practices for network security to keep open against the pirate attacks. There are a number of ways a hacker can hurt your business:
Denial of Service
Denial of service attack has been used to make the network, or more precisely the site, available to potential users, who are doing this web server flood with so many requests for data that consumes all the resources of the web server, which makes both the Web server crash, or slow down so much that you can not handle requests for sites "for users, customers.
BlackHat hacking
There are people called hackers enough technical knowledge to be able to penetrate the unprotected networks, with the intention of doing damage to devices connected to the network and the company will pay as much money as possible. Typical damage is to change the configuration of network devices such as servers and routers, so that the network is not available, this may take a long time to repair, which means the loss of profit, which significantly reduced the productivity . Even worse, a hacker could obtain sensitive information, such as credit card or customer / patient data, they can also manage the network-based telephone system and to make expensive long distance calls at their own expense. The damage can cost your company thousands of pounds, if not more, than the state this weekend alone.
At home, a hacker has fewer opportunities to do harm, but if you keep sensitive information on your PC, such as data from the credit card or digital images of important documents such as passports and driving licenses is clear to see that an attacker can cause all sorts of pain.
There are a number of techniques and equipment to help maintain a secure network:
Firewall
The firewall uses rules to allow or block access to the network, usually located inside the router's firewall. This router is probably peiece device that sits on the edge of the network and provides access to the Internet. The rules are based on opening and closing the doors of the protocols, if network users are not using a particular protocol, then the router to keep the gate closed.
Access Control Lists
An access control list is very similar to a firewall that filters traffic based on a series of measures contained in an IP packet. The access control list (ACL) is configured to verify the origin of each packet and the IP address of destination, the source and destination port number. The network administrator will write the ACL, indicating that the range of IP addresses can talk with others who are the IP addresses and protocols can be used to communicate. This makes it very difficult for a hacker to access a network, each router is doing everything possible to block unauthorized access.
Cryptography
The encryption algorithm used is simple to make valuable information in a format that makes sense and can only be decrypted by someone with access to a specific algorithm. Whenever you send sensitive information via the Internet, submit with high levels of encryption.
WEP / WPA
Today, everyone has a wireless network at home, allowing them to access the Internet using your laptop in any room. Protect your wireless network is a necessity, if not geographically close to someone to connect to the network, which is a haven for pirates. Research has shown that the WPA and the new version, WPA2, are much more secure than WEP. So when you are next to configure the wireless router at home, make sure your security is set to WPA2.
Just follow these tips help you much, its computer networks and information will be safer.
Any network of computers used for business must employ best practices for network security to keep open against the pirate attacks. There are a number of ways a hacker can hurt your business:
Denial of Service
Denial of service attack has been used to make the network, or more precisely the site, available to potential users, who are doing this web server flood with so many requests for data that consumes all the resources of the web server, which makes both the Web server crash, or slow down so much that you can not handle requests for sites "for users, customers.
BlackHat hacking
There are people called hackers enough technical knowledge to be able to penetrate the unprotected networks, with the intention of doing damage to devices connected to the network and the company will pay as much money as possible. Typical damage is to change the configuration of network devices such as servers and routers, so that the network is not available, this may take a long time to repair, which means the loss of profit, which significantly reduced the productivity . Even worse, a hacker could obtain sensitive information, such as credit card or customer / patient data, they can also manage the network-based telephone system and to make expensive long distance calls at their own expense. The damage can cost your company thousands of pounds, if not more, than the state this weekend alone.
At home, a hacker has fewer opportunities to do harm, but if you keep sensitive information on your PC, such as data from the credit card or digital images of important documents such as passports and driving licenses is clear to see that an attacker can cause all sorts of pain.
There are a number of techniques and equipment to help maintain a secure network:
Firewall
The firewall uses rules to allow or block access to the network, usually located inside the router's firewall. This router is probably peiece device that sits on the edge of the network and provides access to the Internet. The rules are based on opening and closing the doors of the protocols, if network users are not using a particular protocol, then the router to keep the gate closed.
Access Control Lists
An access control list is very similar to a firewall that filters traffic based on a series of measures contained in an IP packet. The access control list (ACL) is configured to verify the origin of each packet and the IP address of destination, the source and destination port number. The network administrator will write the ACL, indicating that the range of IP addresses can talk with others who are the IP addresses and protocols can be used to communicate. This makes it very difficult for a hacker to access a network, each router is doing everything possible to block unauthorized access.
Cryptography
The encryption algorithm used is simple to make valuable information in a format that makes sense and can only be decrypted by someone with access to a specific algorithm. Whenever you send sensitive information via the Internet, submit with high levels of encryption.
WEP / WPA
Today, everyone has a wireless network at home, allowing them to access the Internet using your laptop in any room. Protect your wireless network is a necessity, if not geographically close to someone to connect to the network, which is a haven for pirates. Research has shown that the WPA and the new version, WPA2, are much more secure than WEP. So when you are next to configure the wireless router at home, make sure your security is set to WPA2.
Just follow these tips help you much, its computer networks and information will be safer.
The way to ensure your computer network is the computer network security, for that there are several mechanisms of securities that can be practiced to protect the network.
BalasHapussource : http://pctipstrucs.org/fix-pc/23-how-to-secure-a-computer-network
I will do follow all these tips to secure information. All these tips are really useful and by implementing them one can simply secure a network. Thank you so much for all these great tips.
BalasHapuselectronic signature Microsoft