In today's widespread use of networked information technologies and the need to work with the distributed information resources of the successful work of organizations depends on the safety and security of their computer networks. Basic objects (values) that are to be protected in the computer networks of organizations are
Intellectual property
Available computer resources
Confidential internal information
Important information about partners or "third parties" (customers, licensed software).
The known fact is that the majority of organizations are starting to think about the security of their networks, only after there is an intrusion into their network. Accordingly, consideration of the security of computer networks should occur early in the network.
The main components of the strategy include the construction of secure networks
Network security at the network architecture, network protocols and equipment
The use of certified technology and network administration
The use of qualified and / or safety recommendations for system configuration and network management services
Defining a policy network security in its inception.
Wireless Security
A wireless network is based on a cellular architecture where each cell called BSS (Basic Service Set) is controlled by an AP (Access Point) or access point, forming a network called ESS (Extended Service Set). To obtain a satisfactory level of security on a wireless network, it is necessary to know the vulnerabilities inherent in this type of network:
dissemination of information to facilitate the interception passive remote;
the interference sensitivity decreasing the availability of the network;
The insecure default configurations of the new equipment, facilitating attacks.
Beyond training and user awareness, it is necessary to configure the network securely. This step involves configuring different protocol layers but also the periodic audit and continuous monitoring of the network. Despite the security issues are intrinsic to wireless networks and will probably continue to grow. It is therefore important to understand the problems associated with the implementation of such networks in order to mitigate its adverse effects. It is also important to determine the level of security required to implement a solution in line with this choice. Despite some perspective on the IEEE 802.11i standard, it is doomed to establish itself as the standard unifying security. Today, with the hindsight of the IEEE 802.11i standard, using IPSEC is the safest way to secure your wireless network, which does not prohibit implement encryption available radio link.
Remote Access Security
Today, there are various technologies to provide secure remote access, such as IPsec or SSL. However, the security threats to the already long known in the local network, are caused by the fact that the IT department is not always able to get the degree of control over remote system. Indeed, when the computer is in the office, you can with a high degree of certainty that it installed the necessary anti-virus software that has access to it only certain people, etc. When it comes to remote devices, something is difficult to guarantee. Until recently, the IT staff had to rely on security issues in their mobile workers, but often they just do not have the knowledge or skills to protect your ...