Users are happy to get the data on time and without any problem. The use of the authentication and biometrics can improve the security to some extend. Computer Security in the data communication cannot be compromised. Hackers’ can exploit the sensitive and financial and corporate data. There can be many threats to a computer network and it’s the responsibility of a computer network administrator to keep the computer network secure from these threats.
IT Administrator should know about all the possible security attacks and also know their solutions. IT Administrator should look for the viruses from the Internet, Malware, Adware, Trojan horses, E-mail attachments, Floppy disk, CD or any infected computer that is attached to the network. Spyware and network intrusions are specifically designed to get the secret information from their target companies, which can do harm for the company. Everyday security threats are refined as hackers designed new security threats.
The main cause of a security threat in the small companies is the misuse of the internet without proper anti virus, anti spyware installed on the every PC of the company’s network. For example if a company’s employees browse an inappropriate website, sends or receives the infected data, leaks company’s secret information, then there are greater chances for a possible virus/malware attack.
In my opinion, the end user’s education on the security threats, preventions and precautionary measures are must. They should be trained about the possible and easy virus attacks from the internet if they browse the inappropriate sites.
Another important thing is the insider’s attack e.g if the company’s employee leave the company for any reason, then its very important that all the computer and other company’s sensitive assets access should be revoked by him immediately. I have personally seen a situation, when a company’s network administrator was dismissed and he access the company’s server by VPN and send harmful viruses to the server and the entire computer network, and it was impossible for the IT manager to control all the security attacks in one time.
It’s the responsibility to keep a closer eye on the new employee’s activities, their access to the sensitive data, and computers servers. IT managers should bring it in the knowledge of the employees that any change in their computer will be logged. So that nobody can even try to do anything that is not permitted.
There are six basic security steps for the Windows platforms. If a network administrator can follow these steps then he/she can save the computerss from all the possible security threats and virus or malware attacks.
First the IT managers should divide the computer network into the segments. They should filter the access to the internet with the help of a firewall by blocking TCP port 1433 and TCP port 1434. Internet access from the outside should be allowed to the SQL systems. All the unwanted ports should be blocked and only the required ports should be open for access.
Second, moderate the affect of the spoofed ports. The port 80 is the most commonly used port.
Third, as network administrator you should install the current patches to you’re your server computer and client’s up to date. Patches can prevent the systems from the known vulnerabilities. Latest patches can be downloaded from the Windows website. You can also configure to automatically update. Also third party patches products are also available that can be tested and installed. Additionally, by strengthening the user authentication process can be very helpful for security purposes.. You can use password security and other technological methods for the authenticate purpose.
Fourth, you can limit the number of the network administrators it can also be helpful for security a computer network. Admin rights should not be given to the local PC, until and unless it is the requirements for the applications that are installed on the local PCs.
Fifth, protect computers against the known attacks. Don’t disable any Windows known service such as clipbook, Telnet etc. Set the powerful permission the shared network resources.
Last, you can configure the security policies. Implement the security policies on your network.
Security measures and methods have expenses with their purchases. Deployment, maintenance and the implementations of these methods can increase the security cost. Some other things which a IT administrator or a IT manager should keep in mind are the education of the employees about the computer networking security, use of the encryption and digital right management software, block the unwanted emails and audit security on the regular basis. Network security methods should be used and implemented in order to prevent your computer network from the unauthorized access.
In this article you have discovered the Computer Network Security Overview More topics to come are Cisco Labs, Routing, IP addressing & Free IT resources.