Network security deals with all activities
Undertaken to secure the network, in particular to protect the usability, reliability, integrity, and safety of network and data. Target network security is how to prevent and stop sharing threats (potential attacks) in order not to enter and spread on our network. Network security includes hardware components, software rules and security policy rules
Sharing threats that threaten network security can be classified as follows
- Viruses, worms and Trojan horses
- Spyware and Adware
- Zero-day attacks (zero-hour) attacks
- Hacker attacks
- Denial of Service attacks (DoS)
- Data interception and theft
- Identity theft
Understand that there is no and it is not possible to find a single solution that can protect the network from all threats. We need various layers of security (multiple layers of security). If one of the layers fails then the other layer can still serve as a backup.
For example, a network that is equipped by an anti-virus firewall may be able to be traversed by the latest virus that is not recognized by antivirus software in the firewall. Therefore computers that are behind the firewall need to also run antivirus applications that are always in the update.
Another way is often used to secure the network is to use a proxy server. Proxy server can set and select the information that is logged in the internal network. But proxy is not an antivirus application, so we want to secure the network from viruses then we need to build 2 layers of security. The first layer, for access control, is built using a proxy server, while the second layer to prevent viruses can be handled by the antivirus application.
There are still many other examples of the need to implement multiple layer security. Given the complexity of network security coverage.
Read also
- Apa Itu Virus Komputer ?
- Darimana Virus Datang?
- Apakah Virus ada ?
- Bagaimana Komputer Dapat Terinfeksi Virus?
Thank you for reading and visiting Dodi blog and don't forget to share this article because it is very helpful
0 Comments