Network Security 101

As more people are logging onto the Internet everyday, Network Security becomes a larger issue. In the United States, identity theft and computer fraud are among the fastest rising crimes. It is important to protect your network and ensure the safety of all computers and users in that network.

What is a Network?

In order to fully understand network security, one must first understand what exactly a network is. A network is a group of computers that are connected. Computers can be connected in a variety of ways. Some of these ways include a USB port, phone line connection, Ethernet connection, or a wireless connection. The Internet is basically a network of networks. An Internet Service Provider (ISP) is also a network. When a computer connects to the internet, it joins the ISP's network which is joined with a variety of other networks, which are joined with even more networks, and so on. These networks all encompass the Internet. The vast amount of computers on the Internet, and the number of ISPs and large networks makes network security a must.

Common Network Security Breeches

Hackers often try to hack into vulnerable networks. Hackers use a variety of different attacks to cripple a network. Whether you have a home network or a LAN, it is important to know how hackers will attack a network.

One common way for a hacker to wreak havoc is to achieve access to things that ordinary users shouldn't have access to. In any network, administrators have the ability to make certain parts of the network "unauthorized access." If a hacker is able to gain access to a protected area of the network, he or she can possibly affect all of the computers on the network. Some hackers attempt to break into certain networks and release viruses that affect all of the computers in the network. Some hackers can also view information that they are not supposed to see.

Destructive Attacks

There are two major categories for destructive attacks to a network. Data Diddling is the first attack. It usually is not immediately apparent that something is wrong with your computer when it has been subjected to a data diddler. Data diddlers will generally change numbers or files slightly, and the damage becomes apparent much later. Once a problem is discovered, it can be very difficult to trust any of your previous data because the culprit could have potentially fooled with many different documents.

The second type of data destruction is outright deletion. Some hackers will simply hack into a computer and delete essential files. This inevitably causes major problems for any business and can even lead to a computer being deemed useless. Hackers can rip operating systems apart and cause terrible problems to a network or a computer.

The Importance of Network Security

Knowing how destructive hackers can be shows you the importance of Network Security. Most networks have firewalls enabled that block hackers and viruses. Having anti-virus software on all computers in a network is a must. In a network, all of the computers are connected, so that if one computer gets a virus, all of the other computers can be adversely affected by this same virus. Any network administrator should have all of the essential files on back up disks. If a file is deleted by a hacker, but you have it on back up, then there is no issue. When files are lost forever, major problems ensue. Network security is an important thing for a business, or a home. Hackers try to make people's lives difficult, but if you are ready for them, your network will be safe.

Robert Flanglin is very interested in security and enjoys writing about network security. Robert Flanglin also writes for the Network Security Journal ( http://www.networksecurityjournal.com ).

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

Canada Blocks Chinese Takeover on Security Concerns
New York Times
HONG KONG — Canada has blocked a $1 billion takeover of a construction company by a state-controlled Chinese company over national security concerns, a rare move by a government that until now has largely welcomed such deals despite growing ...
Canada Blocks Chinese Takeover of Aecon on Security Concerns ...Bloomberg
Canada blocks Chinese takeover of Aecon on security groundsReuters
Canada blocks Chinese takeover of Aecon on security concernsFinancial Times
The Globe and Mail
all 48 news articles »

CNBC

Automakers: Trump asks for security investigation of vehicle imports
CNBC
President Donald Trump has asked for the investigation of automobile imports into the United States on a "national security" basis.

and more »

Politico

Trump considering 25 percent tax on car imports, citing national security
Politico
President Donald Trump wants to put a 25 percent tariff on imports of automobiles under a similar authority that allowed him to slap duties on imports of steel and aluminum in order to protect U.S. national security, a senior administration official ...
US launches national security probe of vehicle importsReuters
Trump Wants To Investigate The Effect Of Imported Cars On National SecurityJalopnik
Automakers Slump as Trump Launches National Security Probe into US Car ImportsTheStreet.com
Autoblog (blog) -Daily Beast -Twitter -Wall Street Journal
all 129 news articles »

New York Times

In Bitter Exchange, Pompeo Defends His Concerns for Diplomats' Security
New York Times
The striking exchange in front of the House Foreign Affairs Committee — over the security of diplomats abroad — came during Mr. Pompeo's first Capitol Hill appearance since taking over the State Department. It w as a reminder of his criticism of Mrs ...

and more »

New York Daily News

Georgia jury awards $1 billion verdict against security company after guard rapes teen
New York Daily News
Hope Cheston was outside by some picnic tables with her boyfriend during a party in October 2012 when an armed security guard approached, attorney L. Chris Stewart told The Associated Press on Wednesday. The guard told the boyfriend not to move and ...
Security Company To Pay $1 Billion To Woman Raped By Guard They Hired: JuryWFMYNews2.com
Rape victim wins $1 billion verdict in civil suit against security companyHamilton Journal News
Jury awards $1.3 billion verdict against security company after employee rapes teenage girlABC Online

all 14 news articles »

MyAJC

Kushner receives permanent security clearance, ending uncertainty over his status
MyAJC
Jared Kushner, President Donald Trump's son-in-law and senior adviser, now has a permanent security clearance and recently sat for six to seven hours of questioning by special counsel Robert Mueller's team on a wide range of topics including Trump's ...

and more »

The Good & Bad News about Blockchain Security
Dark Reading
Blockchain is, at its core, a method for humans to conduct secure, verified, and recorded transactions online without the use of a middle party. Bitcoin, in which money can be passed between online users without the presence of a bank or holdings ...


WBUR

Increased Border Security 'Absolutely Has To Happen,' Colorado Sheriff Says
WBUR
"The concern that we have oftentimes in our local communities [is] without sufficient border security, we see crime that comes across the border and ends up in our communities. And we recognize that we just need a more secure border," Smith says. "We ...


Reuters

In costly quest for security, US schools face law of diminishing returns
Reuters
In the rush to find answers, school security has ballooned into a multibillion-dollar industry. Meanwhile, some schools are spending precious funds on untested technologies, safety experts said, even though the most robust and effective safety measures ...

Google News

Why Corporations Need to Worry About Phishing

Phishing is a relatively new form of online fraud that... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

7 Ways to Spot a PayPal Scam E-Mail

Paypal is a great site and is used by many... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER

From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More