FACTOID # 14: North Carolina has a larger Native American population than North Dakota, South Dakota and Montana combined.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Network security

Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together. A computer network is an interconnected group of computers. ... A security policy is a generic document that outlines rules for computer network access, determines how policies are enforced and lays out some of the basic architecture of the company security environment. ... The terms network administrator, network specialist and network analyst designate job positions of engineers involved in computer networks, the people who carry out network administration. ... In security engineering and computer security, authorization, is a part of the operating system that protects computer resources by only allowing those resources to be used by resource consumers that have been granted authority to use them. ...

Contents

Comparison with computer security

Securing network infrastructure is like securing possible entry points of attacks on a country by deploying appropriate defense. Computer security is more like providing means to protect a single PC against outside intrusion. The former is better and practical to protect the civilians from getting exposed to the attacks. The preventive measures attempt to secure the access to individual computers--the network itself--thereby protecting the computers and other shared resources such as printers, network-attached storage connected by the network. Attacks could be stopped at their entry points before they spread. As opposed to this, in computer security the measures taken are focused on securing individual computer hosts. A computer host whose security is compromised is likely to infect other hosts connected to a potentially unsecured network. A computer host's security is vulnerable to users with higher access privileges to those hosts. In military science, defense (or defence) is the art of preventing an enemy from conquering territory; usually via fortifications. ... A stylised illustration of a personal computer A personal computer (PC) is a computer whose original sales price, size, and capabilities make it useful for individuals, intended to be operated directly by an end user, with no intervening computer operator. ... Network-attached storage (NAS) is a file-level data storage connected to a computer network providing data access to heterogeneous network clients. ...


Attributes of a secure network

Network security starts from authenticating any user, most likely an username and a password. Once authenticated, a stateful firewall enforces access policies such as what services are allowed to be accessed by the network users.[1] Though effective to prevent unauthorized james jorde is gay, this component fails to check potentially harmful contents such as computer worms being transmitted over the network. An intrusion prevention system (IPS)[2] helps detect and prevent such malware. IPS also monitors for suspicious network traffic for contents, volume and anomalies to protect the network from attacks such as denial of service. Communication between two hosts using the network could be encrypted to maintain privacy. Individual events occurring on the network could be tracked for audit purposes and for a later high level analysis. For other uses of the terms authentication, authentic and authenticity, see authenticity. ... This article is about the network security device. ... A computer worm is a self-replicating computer program. ... An intrusion prevention system (a computer security term) is any device which exercises access control to protect computers from exploitation. ... A screenshot of a malicious website attempting to install spyware via an ActiveX Control in Internet Explorer 6 Malware is software designed to infiltrate or damage a computer system without the owners informed consent. ... Deep packet inspection (DPI) (or sometimes complete packet inspection) is a form of computer network packet filtering that examines the data and/or header part of a packet as it passes an inspection point, searching for non-protocol compliance, viruses, spam, intrusions or predefined criteria to decide if the packet... An Anomaly-Based Intrusion Detection System, is a system for detecting computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous. ... A denial-of-service attack (also, DoS attack) is an attack on a computer system or network that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system. ... VPN redirects here. ...


Honeypots, essentially decoy network-accessible resources, could be deployed in a network as surveillance and early-warning tools. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis could be used to further tighten security of the actual network being protected by the honeypot.[3] It has been suggested that Honeynet be merged into this article or section. ... For other uses, see Decoy (disambiguation). ... An exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized). ...


Security management

Security Management for networks is different for all kinds of situations. A small home or an office would only require basic security while large businesses will require high maintenance and advanced software and hardware to prevent malicious attacks from hacking and spamming. For more information on how to hack visit www. ... A KMail folder full of spam emails collected over a few days. ...


Small homes

Firewall may refer to: Firewall (construction), a physical barrier inside a building or vehicle, designed to limit the spread of fire, heat and structural collapse Firewall (networking), a logical barrier designed to prevent unauthorized or unwanted communications between sections of a computer network Firewall (film), a 2006 action film written... Antivirus redirects here. ... McAfee, Inc. ... Norton AntiVirus (NAV) is a popular product of Symantec Corporation and is one of the most widely used antivirus programs. ... Windows Defender, previously known as Microsoft AntiSpyware, is a software product from Microsoft designed to prevent, remove and quarantine spyware on Microsofts Windows XP, Windows Server 2003, and Windows Vista operating systems. ...

Medium businesses

Firewall may refer to: Firewall (construction), a physical barrier inside a building or vehicle, designed to limit the spread of fire, heat and structural collapse Firewall (networking), a logical barrier designed to prevent unauthorized or unwanted communications between sections of a computer network Firewall (film), a 2006 action film written... Antivirus redirects here. ... For other uses of the terms authentication, authentic and authenticity, see authenticity. ... Physical security describes measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media. ... Network analyzer may mean: A packet sniffer, used on a computer data network A category of electronic test equipment used with electrical networks. ...

Large businesses

Firewall may refer to: Firewall (construction), a physical barrier inside a building or vehicle, designed to limit the spread of fire, heat and structural collapse Firewall (networking), a logical barrier designed to prevent unauthorized or unwanted communications between sections of a computer network Firewall (film), a 2006 action film written... Look up proxy in Wiktionary, the free dictionary. ... Antivirus redirects here. ... For other uses of the terms authentication, authentic and authenticity, see authenticity. ... Physical security describes measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media. ... Network analyzer may mean: A packet sniffer, used on a computer data network A category of electronic test equipment used with electrical networks. ... Physical security describes measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media. ... Closed-circuit cameras are often used to discourage crime Closed-circuit television (CCTV), as a collection surveillance cameras doing video surveillance, is the use of television cameras for surveillance. ... ... Fire extinguisher A fire extinguisher is a device used to put out a fire, often in an emergency situation. ... A security guard is a private person who is employed to protect property and people. ...

Government

  • A strong strong firewall and proxy to keep unwanted people out.
  • A strong Antivirus software and Internet Security Software.
  • Strong encryption, usually with a 256 bit key.
  • Whitelist authorized wireless connection, block all else.
  • All network hardware is in secure zones.
  • All host should be on a private network that is invisible from the outside.
  • Put all servers in a DMZ, or a firewall from the outside and from the inside.
  • Security fencing to mark perimeter and set wireless range to this.

Firewall may refer to: Firewall (construction), a physical barrier inside a building or vehicle, designed to limit the spread of fire, heat and structural collapse Firewall (networking), a logical barrier designed to prevent unauthorized or unwanted communications between sections of a computer network Firewall (film), a 2006 action film written... Look up proxy in Wiktionary, the free dictionary. ... Antivirus redirects here. ... Encrypt redirects here. ... This article or section does not cite any references or sources. ... ...

References

  1. ^ A Role-Based Trusted Network Provides Pervasive Security and Compliance - interview with Jayshree Ullal, senior VP of Cisco
  2. ^ Dave Dittrich, Network monitoring/Intrusion Detection Systems (IDS), University of Washington.
  3. ^ Honeypots, Honeynets
  • Security of the Internet (The Froehlich/Kent Encyclopedia of Telecommunications vol. 15. Marcel Dekker, New York, 1997, pp. 231-255.)
  • Introduction to Network Security, Matt Curtin.

Cisco may refer to: Cisco Systems, a computer networking company Cisco IOS, an internet router operating system CISCO Security Private Limited, a security company in Singapore Commercial and Industrial Security Corporation, a statutory board in Singapore Abbreviation for San Francisco, California Cisco (wine) The Cisco Kid, a fictional character created...

Further reading

  • Security Monitoring with Cisco Security MARS, Gary Halleen/Greg Kellogg, Cisco Press, Jul. 6, 2007.
  • Self-Defending Networks: The Next Generation of Network Security, Duane DeCapite, Cisco Press, Sep. 8, 2006.
  • Security Threat Mitigation and Response: Understanding CS-MARS, Dale Tesch/Greg Abelar, Cisco Press, Sep. 26, 2006.
  • Deploying Zone-Based Firewalls, Ivan Pepelnjak, Cisco Press, Oct. 5, 2006.
  • Network Security: PRIVATE Communication in a PUBLIC World, Charlie Kaufman | Radia Perlman | Mike Speciner, Prentice-Hall, 2002. ISBN .

See also

Crimeware is a class of computer program designed specifically to automate financial crime. ... Data Loss Prevention (DLP) is a computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders. ... It has been suggested that this article or section be merged with Wireless security. ... This is a timeline of hacker history. ... Information Leakage Detection and Prevention (ILD&P or ILDP) is a computer security term referring to systems designed to detect and prevent the unauthorized transmission of information from the computer systems of an organization to outsiders. ...

External links

  • Cisco IT Case Studies about Security and VPN
  • Debate: The data or the source - which is the real threat to network security? - Video
  • SANS Institute network security resources
  • OpenLearn - Network Security

Network Security Testing:

  • Insecure.org
  • Sourceforge
  • Hackerz
  • Leetupload::Unix Systems
  • Leetupload::Windows Systems

  Results from FactBites:
 
Home Network Security (5527 words)
Because of this "shared-medium" topology, cable modem users may experience somewhat slower network access during periods of peak demand, and may be more susceptible to risks such as packet sniffing and unprotected windows shares than users with other types of connectivity.
Corporate and government networks are typically protected by many layers of security, ranging from network firewalls to encryption.
Network Address Translation (NAT) provides a way to hide the IP addresses of a private network from the Internet while still allowing computers on that network to access the Internet.
Network Security, Filters and Firewalls (2266 words)
Several methods exist for the secure authentication and encryption of telnet and rlogin sessions (Kerberos, S/Key and DESlogin) which are examples of encryption at the highest level of the stack (the application layer).
Further, both methods have impacts on other areas (security related and otherwise- such as address allocation, fault tolerance and load balancing) that need to be considered before any choice is made as to which is best for a particular case.
There are two basic types of network security, transit security and traffic regulation, which when combined can help guarantee that the right information is securely delivered to the right place.
  More results at FactBites »

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m