Friday, 11 September 2009

Internet technology




Security Technologies
With the rapid growth of interest in the Internet, network security has become a major concern to companies throughout the world. The fact that the information and tools needed to penetrate the security of corporate networks are widely available has increased that concern.Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration.
Protecting Confidential Information
Confidential information can reside in two states on a network. It can reside on physical storage media, such as a hard drive or memory, or it can reside in transit across the physical network wire in the form of packets. These two information states present multiple opportunities for attacks from users on your internal network, as well as those users on the Internet. We are primarily concerned with the second state, which involves network security issues. The following are five common methods of attack that present opportunities to compromise the information on your network:

• Network packet sniffers

• IP spoofing

• Password attacks

• Distribution of sensitive internal information to external sources

• Man-in-the-middle attacks


Developing Your Security Design
-Knowing your enemy means knowing attackers or intruders.
-Security measures usually reduce convenience, especially for sophisticated users.
-Most security is based on secrets. Passwords and encryption keys, for example, are secrets.
-Every security system has vulnerabilities. You should understand your system's weak points and know how they could be exploited.
-Almost any change that you make in your system may have security effects.

No comments:

Post a Comment