Tuesday, September 25, 2012

Network Security Wiki

Network security refers to the protection of network systems, hardware, software and data, so they are not leaked by accident or due to malicious reasons, and the network service is stable and runs continuously without interruption. Network security involves a comprehensive calculation of computer science, network technology, communication technology, password technology, information security technology, applied mathematics, number theory, information theory and other disciplines.

Key Features:

Confidentiality

Information is not leaked to unauthorized users.

Integrity

Information and data kept in storage or in the transmission process, are not modified without authorization, not destroyed and not missing any features.

Availability

With authorization, data can be used as necessary.

Controllability

The ability to control the dissemination of information and content.

Auditability

Filtration of bad data, prevention of illegal or harmful usage of data such as information involving state or national secrets, and prevention of confidential information leakage.

Typically, system security, performance and functionality have a contradictory relationship. If a network system does not provide any service to (i.e. is disconnected from) the public, the outside world is unlikely to pose a security threat. However, most companies provide online stores and e-commerce services that require a somewhat open network environment, which then opens the gateway for security issues.

The necessary authentication, encryption, monitoring, analyses, and reports affect network efficiency, and reduce the flexibility of the client's application and Internet connection. At the same time, it will increase administrative expenses.

Good network security coverage should have the following features:

1. Check for security vulnerabilities: Perform cycle checks; even if a hacker can reach its target, the system is able to make the attack/s ineffective.

2. Attack monitoring: Real-time detection and attack monitoring; such as auto disconnect network services, recording attack history and log file, and tracking the source of the attack.

3. Encrypt data: With encryption, an attacker cannot understand or modify the information.

4. Authorization: Prevents an attacker from impersonating legitimate users.

5. Backup and recovery: A good backup and recovery mechanism, so as soon as losses occur in an attack, the data service will stop and restore immediately.

6. Multiple layers of defense: When an attacker breaks through the first layer, the system delays or blocks it from reaching the next layer or target.

7. Hide internal information: An attacker will not be able to understand the system.

40 comments:

  1. Thank you for writing this. I love the internet because you can learn something new every day. I'll share this with my friends, thank you!
    Site Support and Monitoring

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete
  3. Great blog. With a Network Security System, all the files, data & personal information are kept safe and protected from unauthorized access. Get best services for Network Solutions Baton Rouge.

    ReplyDelete
  4. Authenticity, confidentiality, integrity are some of the goals of information security. Thank you for sharing this valuable information. For individuals, small business, or enterprises, it is essential to learn about cyber security in order to prevent potential threats and secure their information. As a network security audit company, I found this information helpful. Great blog.

    ReplyDelete
  5. Interesting topic for a blog. I have been searching the Internet for fun and came upon your website. Fabulous post. Thanks a ton for sharing your knowledge! It is great to see that some people still put in an effort into managing their websites. I'll be sure to check back again real soon. burglar alarm system

    ReplyDelete
  6. Outstanding blog site! I am amazed with pointers of writer. NEC Phones Brisbane

    ReplyDelete
  7. Thanks for taking the time to discuss this, I feel strongly about it and love learning more on this topic. If possible, as you gain expertise, would you mind updating your blog with extra information? It is extremely helpful for me. security company

    ReplyDelete
  8. This blog is so nice to me. I will keep on coming here again and again. Visit my link as well.. Singapore security company

    ReplyDelete
  9. Positive site, where did u come up with the information on this posting?I have read a few of the articles on your website now, and I really like your style. Thanks a million and please keep up the effective work. security guard singapore

    ReplyDelete
  10. Good post but I was wondering if you could write a litte more on this subject? I’d be very thankful if you could elaborate a little bit further. Appreciate it..! Swagger Training

    ReplyDelete
  11. My companion referenced to me your blog, so I thought I'd read it for myself. Interesting experiences, will be back for additional! legit western union hacker

    ReplyDelete

  12. Hi there, I read your blogs on a regular basis. Your humoristic style is witty, keep it up! Thank You for Providing Such a Unique and valuable information, If you are looking for the best buy antivirus, then visit K7 Computing. I enjoyed this blog post.

    ReplyDelete
  13. Thank you for some other informative website. The place else may just I get that kind of information written in such a perfect method? I have a venture that I am simply now running on, and I’ve been at the glance out for such info. https://singaporesecuritycompanies.yolasite.com/

    ReplyDelete
  14. I am looking for and I love to post a comment that "The content of your post is awesome" Great work! Bio

    ReplyDelete
  15. I think this is an informative post and it is very useful and knowledgeable. therefore, I would like to thank you for the efforts you have made in writing this article. http://cctv12.jigsy.com/

    ReplyDelete
  16. Really enjoyed this article post. Much thanks again. Great.
    singapore security company

    ReplyDelete
  17. I was surfing the Internet for information and came across your blog. I am impressed by the information you have on this blog. It shows how well you understand this subject. http://securityalarmmanagementservice.simplesite.com/

    ReplyDelete
  18. Pretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I'll be subscribing to your feed and I hope you post again soon. Big thanks for the useful info. best cambodian security company

    ReplyDelete
  19. Wow, cool post. I’d like to write like this too – taking time and real hard work to make a great article… but I put things off too much and never seem to get started. Thanks though. Prince Security Service

    ReplyDelete
  20. Thanks for sharing this information. I really like your blog post very much. You have really shared a informative and interesting blog post with people.. cambodia security company

    ReplyDelete
  21. This is my first time i visit here. I found so many interesting stuff in your blog especially its discussion. From the tons of comments on your articles, I guess I am not the only one having all the enjoyment here keep up the good work best security company in cambodia

    ReplyDelete
  22. I would like to thank you for the efforts you have made in writing this article. I am hoping the same best work from you in the future as well. Thanks... security service in cambodia

    ReplyDelete
  23. I think this is an informative post and it is very useful and knowledgeable. therefore, I would like to thank you for the efforts you have made in writing this article. security guard in cambodia

    ReplyDelete
  24. Pretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I'll be subscribing to your feed and I hope you post again soon. Big thanks for the useful info. https://danielle-s-school-5bba.thinkific.com/courses/your-first-course

    ReplyDelete
  25. I was surfing the Internet for information and came across your blog. I am impressed by the information you have on this blog. It shows how well you understand this subject. singapore security alarm

    ReplyDelete
  26. Positive site, where did u come up with the information on this posting?I have read a few of the articles on your website now, and I really like your style. Thanks a million and please keep up the effective work. security services

    ReplyDelete
  27. I admire this article for the well-researched content and excellent wording. I got so involved in this material that I couldn’t stop reading. I am impressed with your work and skill. Thank you so much. security service company in cambodia

    ReplyDelete
  28. Attractive, post. I just stumbled upon your weblog and wanted to say that I have liked browsing your blog posts. After all, I will surely subscribe to your feed, and I hope you will write again soon! https://security-s-school-1cc6.thinkific.com/courses/your-first-course

    ReplyDelete
  29. Thanks for taking the time to discuss this, I feel strongly about it and love learning more on this topic. If possible, as you gain expertise, would you mind updating your blog with more information? It is extremely helpful for me. security alarm

    ReplyDelete
  30. We are really grateful for your blog post. You will find a lot of approaches after visiting your post. I was exactly searching for. Thanks for such post and please keep it up. Great work. get security services in cambododia

    ReplyDelete
  31. A very awesome blog post. We are really grateful for your blog post. You will find a lot of approaches after visiting your post. security guard service in cambodia

    ReplyDelete
  32. I think this is an informative post and it is very useful and knowledgeable. therefore, I would like to thank you for the efforts you have made in writing this article. security services to get

    ReplyDelete
  33. I think this is an informative post and it is very useful and knowledgeable. therefore, I would like to thank you for the efforts you have made in writing this article. alarm monitoring system singapore

    ReplyDelete
  34. I wanted to thank you for this great read!! I definitely enjoying every little bit of it I have you bookmarked to check out new stuff you post. https://penzu.com/p/ce7d37f9

    ReplyDelete
  35. I am impressed. I don't think Ive met anyone who knows as much about this subject as you do. You are truly well informed and very intelligent. You wrote something that people could understand and made the subject intriguing for everyone. Really, great blog you have got here. https://site-7600093-1900-3567.mystrikingly.com/

    ReplyDelete
  36. You made such an interesting piece to read, giving every subject enlightenment for us to gain knowledge. Thanks for sharing the such information with us to read this... best khmer security company

    ReplyDelete
  37. This blog is really helpful to deliver updated affairs over internet which is really appraisable.
    Cyber Security Brisbane

    ReplyDelete
  38. Such a strikingly essential article.I fundamentally wish to offer an animal continue for the standard information you have impeccable here on this post. DL Doll

    ReplyDelete
  39. Since prepaid IoT SIM Card are the greatest option for international travel, you will always be aware of how much money you have spent after making a call. This implies that you have extra money in your pocket to spend on mementos of all of the lovely locations you have been to during your life.

    ReplyDelete