Work Around
- Be aware of the key areas in Network which are prone to security breach.
Network needs security in three areas:
- Perimeter where network connects to internet: Firewalls are each internet connection helps keep hackers and mischief’s away.
- Securing remote connections such as office, satellite as well as employees who connect 0from road or from home.
- Endpoints: This include individual devices on the network. They are most difficult to secure as they are more prone to malicious activities and difficult to secure due to there quantity, diversity and habits of people who are using them. It is at the endpoints that the hacking or other attack takes place and the attack propagates through the network making it insecure and may hinder in its functioning.
Source: IQ by Cisco Systems Third Quarter 2006
Note: Check out tips and tricks to reduce Network Down time in the Previous post
2 comments:
There are various tools available for securing and monitoring the network. The process of network security is not so simple as it appears but a challenging and time consuming one.
esign
Post a Comment