We don’t need no network control!

--Originally published at The shield of the world

So, today we are going to talk about Network Security. Network security is the process of taking the physical and software preventive measures to protect the networking infrastructure from unauthorized access, malfunction, modification, destruction or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions in a safe environment.

Which involves the authorization of access to data in a network, which is controlled by the network administrator. Here is were the users choose or are assigned an ID and password or other authentication information that allows them to access to information and program within their authority. Like the accounts in school or work. Here is were you pray for the network admin to be a master in passwords creation, to help you and the network not get unauthorized access. You can see You shall not pass! to know more about.

2004

So why is important to have a secure network? Well that’s quite easy, because you want to avoid:

  • Viruses, worms, Trojan horses… MALWARE (we already talked about that ¡Un pejelagarto se metió a la cocina!)
  • Spyware and adware…which we can considere that Malware too
  • Zero-day attacks, also called zero-hour attacks
  • Hacker attacks (vulnerabilities)
  • Denial of service, YOU ARE THE 1 MILLION VISITOR!
  • Data interception and theft
  • Identity theft

2005

And how do the network admin protector of the planet will fight against that? Easy question too, with some of this tools:

  • Anti-virus and anti-spyware
  • Firewall, to block unauthorized access to your network
  • Intrusion prevention systems (IPS), to identify fast-spreading threats
  • Virtual Private Networks (VPN), to improve secure remote access

200w1

But this are not all the tools used to maintain and protect the data and information of a company. A security policy is something really useful for a company and we will talk

it in future post.

We can see a brief explanation of one of the tools we can use in our network to ensure that only the devices we want in number or in specific can access and communicate on the network. We can also set the max number of Mac Address and make the port shutdown the connection when it detects more than the number of devices we configure.

 

That’s all folks!

All the Gif are from Giphy.