السبت، 15 يونيو 2013

Securing the Network

Security is a fundamental component of every network design. When planning, building,and operating a network, you should understand the importance of a strong security policy. How important is it to have a strong network security policy? The Computer Security Institute (CSI) produced a report from the “Computer Crime and Security Survey” that provided an updated look at the impact of computer crime in the United States.
One of the major participants was the San Francisco Federal Bureau of Investigation (FBI) Computer Intrusion Squad. Based on responses from over 700 computer security practitioners in U.S. corporations, government agencies, financial institutions, medical institutions, and universities, the survey confirms that the threat from computer crime and other information security breaches continues unabated and that the financial toll is mounting.
 The application of an effective security policy is the most important step that an organization must take to protect itself. An effective security policy is the foundation for all of the activities undertaken to secure network resources. Need for Network Security In the past, hackers were highly skilled programmers who understood the intricacies of computer communications and how to exploit vulnerabilities. Today almost anyone can become a hacker by downloading tools from the Internet. These sophisticated attack tools and generally open networks have generated an increased need for network security and dynamic security policies.The easiest way to protect a network from an outside attack is to close it off completely from the outside world.
 A closed network provides connectivity only to trusted known parties and sites; a closed network does not allow a connection to public networks.Because they have no Internet connectivity, networks designed in this way can be considered safe from Internet attacks. However, internal threats still exist. The CSI in San Francisco, California, estimates that 60 to 80 percent of network misuse comes from insideToday, corporate networks require access to the Internet and other public networks. Most
of these networks have several access points to public and other private networks. Securing open networks is important.As previously mentioned, one of the challenges to security is that hacking a network hasbecome easier for those with little or no computer skills. Figure 1-18 illustrates how theincreasing sophistication of hacking tools and the decreasing skill needed to use these tools have combined to pose increasing threats to open networks.

ليست هناك تعليقات:

إرسال تعليق