Network Security

Network Security: Preventative Measures

Hello Everyone! 

As you all know, network security plays a huge aspect in everyone’s life. Whether it may be simple online browsing or at the job site, network security plays a pivotal role in the protection of computer networks and their data from malicious hackers. 

Network security involves involved in implementing checks and balances to ensure peace of mind while browsing the internet. 

Here are some common key aspects when it comes to network security:

Virtual Private Networks (VPNs): VPNs provide a stable and secure connection over public networks. VPNs encrypt data so no one has access to sensitive information. 

  • A common problem many online users face is getting their information leaked and logged. With that in mind, many users with malicious intent, use this data for financial gain.
2 Factor Authentication/Authorization (2FA): 2FA is a tool used by many colleges and financial institutions for their members. 2FA ensures that only authorized users can access the device/network. 
  • Services such as OKTA, Authy, and DUO security are all 2FA systems that plenty of companies use to prevent any unauthorized users from accessing databases. I’m sure you have used one of the 2FA services in the past whether it may have been in college or your current profession. 
Intrusion Detection and Prevention Systems (IDS/IPS): Systems such as these monitor network traffic for suspicious patterns or known attack signatures. An IDS detects potential threats, while IPS can actively block attacks in real-time. 
  • Systems such as IDS/IPS can prevent a common problem many individuals and companies encounter, and that is DDoS (distributed denial of service) attacks. DDoS is a type of cyber attack that aims to make an online service, website, or network resource unavailable to its users by creating a huge amount of traffic or requests. 
Encryption: Data encryption protects sensitive information during storage or transmission. Data encryption prevents attackers to gain access to sensitive information by making data unreadable without decryption keys. 
  • Some examples of encryption found in the corporate world are Email/file encryption, full disk encryption, and database encryption. These preventative measures often include a code or administrative access to gain access to sensitive data. 






Comments

Popular Posts