By Malik Asad
Before knowing that what network security is? First of all, understand why it is needed?
Why we need network security?
You cannot understand the importance of your data on the network until somebody takes access to your data and alter it. You lose the privacy of your system. To avoid this type of issue, you need to secure your network.
Network security is the process in which the security of your system’s network does not all unauthorized user access.
Purpose of network security
The objective of network security is to improve the protection of the network by following factors:
Usually, when we receive an unknown person at our home door, we ask that person who you are? It is because we want to ensure a person’s identity.
Just like this, if any person wants to get access to your system, you will have to provide your system user name and password.
The authentication process checks whether the person is a legitimate user or not. This process handles the person, the server, and the network.
Authorization means providing authority. But on which asserts and application access is allowed is handled by the system administrator.
It means is that having control over personal information. You must have secure our web application and other private data passwords. If someone gets access to your personal information, it’s mean your privacy is lost.
It is a process of being unidentified to others.
In a network, if someone tries to access the personal data of other’s system then before attacking the targeted system network, that person has to hide himself to disappear his identity. It is called anonymity.
It is a process because it keeps traces of the action of a person on the network in another system.
Authentication and Authorization processes perform their functioning properly network becomes secure. It will be an attack on the system if someone tries to break the privacy of another user and if anyone tries to enter the system without authentication. So these processes are considered to be very important while dealing with network security.
Importance of network security for business
Along with protecting someone’s data network, security is necessary at the business level also. It provides the following benefits.
Before being attacked by attackers, the system faces threats and vulnerability, and then it is attacked.
Probability of something going wrong, which can affect the system. An attacker can take advantage of weakness in your system, and through this weak point, they can cause damage more easily
There must be some circumstances are created that have enough potential to cause harm.
In the cause of an attack, your system is affected, or something wrong can happen to it like, personal data can be lost or altered, and the system can also stop working.
It is necessary to understand that vulnerability is the cause of the threat, and when it generates, it becomes a cause of the attack.
Types of attack
Attack affects the user system directly or indirectly. There are the following types of attacks.
Viruses attach themselves to legitimate programs on the victim’s machine. This affected program transfers to another system and runs on that system, virus from the affected program, attached its self to another program in that system too.
It is noted that if a virus comes into any system, it may or may not suddenly perform any action. When a virus enters the system, it will wait for specific conditions to meet and then attack it. Read More…
A worm is a small piece of virus that creates a copy of itself while using the computer network.
“Internet worm” was the first worm introduced in 1988. A worm spreads through an email attachment. when you open such an email containing a worm, then it will affect your system. If you send it to others users it will affect their system too. Read More…
It is a non-self-replicating program that performs some function according to the desire of users.
It does not operate autonomously. It is hidden, within a legitimate program.
Let suppose you download a file for the internet that contains Trojan in it. Trojan may look very interesting and suspect less, and when executed, they become harmful…
It is a program that under certain circumstances initiate security incident. It waits for a specific condition to occur.
Logic bomb active on either stack overflow or buffer overflow.
The logic bomb can be hidden in a virus, worm, or Trojan horse by the attackers.
When you open the malicious software attacker becomes able to access the system. After getting access, they cause damage as much as they want. Logic bomb designs to affect specific data and events
It can be defined, a successful attack, incident, or security breach.
When a threat successfully harms the business, business compromises with harm.
These are tools use to thwart the attack. It is the process of protection and control.
By nature, a countermeasure can be technical, manual, or a combination of two.
The purpose of countermeasure is to keep the business process run smoothly for meeting their goal.
Types of countermeasure
There are three types of countermeasure
This process keeps the attack being successful. It takes preventative measurements against threats or attacks.
It identifies the threat that attacked the system, especially when it is impactful. Damage is minimized by a fast detection process.
The correction process after compromise gets all the business process back on proper functioning again.
Powered By Impressive Business WordPress Theme