Defining Network Security
This definition is perhaps a little misleading when it comes to computer and networking security, as it implies a degree of protection that is inherently impossible in the modern connectivity-oriented computing environment.
This is why the same dictionary provides another definition specific to computer science: “The level to which a program or device is safe from unauthorized use.” Implicit in this definition is the caveat that the objectives of security and accessibility – the two top priorities on the minds of many network administrators – are, by their very natures, diametrically opposed. The more accessible your data is, the less secure it is. Likewise, the more tightly you secure it, the more you impede accessibility. Any security plan is an attempt to strike the proper balance between the two.
As in any other specialty field, security professionals speak a language all their own and understanding the concepts requires that you learn the jargon. At the end of this section, you will fi nd a list of some common terms that you are likely to encounter in the IT security fields.
The term computer security encompasses many related, yet separate, topics. These can be stated as security objectives, and include:
■ Control of physical accessibility to the computer(s) and/or network
■ Prevention of accidental erasure, modify cation or compromise of data
■ Detection and prevention of intentional internal security breaches
■ Detection and prevention of unauthorized external intrusions (hacking)
Network security solutions are loosely divided into three categories: hardware, software and human.
we will provide an overview of basic security concepts. Then, we will examine the four security objectives and look at each of the three categories of security solutions
Authentication: For both human visible level and machine level.
Software: Is a tool that monitors network traffic and alerts
about risks and abnormal events.
Training: For providing network security skills and experience.
Protecting Your Environment: A more secure system is better
Physical Security: The first level of security in any computer
network is physical security.
Remote Solutions: Because evolving businesses require instant
remote access to critical services and applications.