Monday, April 27, 2009

what is computer network security?

Own computer network security is often seen as the result of several factors. This Factor varies depending on the material basis, but normally at least some of the things below included:

  • Confidentiality
    There are several types of information that is available in a computer network. Each data certainly have different user groups that are different and the data can be grouped so that some restrictions to the use of data must be determined. In general, the data that there is within a company are confidential and may not be known by third parties with the aim to protect confidential company and the company's strategy. Backdoor, for example, violates the because of company policy that does not provide access into the desired network computer companies.

    Confidentiality can be improved and in some cases data encryption or using a VPN. Access control is a commonly used to restrict access into a computer network. An easy way but to be able to restrict access is to using a combination of a username-and-password for the user and the Authentication provide access to the user (users) that have been identified. Some work in the environment computer network security, this is separated and discussed in the context of Authentication.

  • Integrity
    Computer network that can also be relied upon based on the fact that the available data what should have been. Computer network would not want to be protected from attack that can change in the port of transmits. Man-in-the-Middle is the type of attacks that could alter the integrity of the data which attacker can pirate "session" or manipulate the data sent. In a computer network is secure, the participants of a "transaction" data must be sure that people involved in the communication data can be reliable and trustworthy. Security from a data communication is needed on a level that is not data change during the process of sending and receiving of communication data at the time. This need not always
    means that the "traffic" in need encryption, but also not closed the possibility of "Man-in-the-Middle "can occur.

  • Availability
    The availability of data or services can be easily monitored by the user from a service. Where is the unavailability of a service can be a hindrance to go for a company and can even impact worse, namely termination production process. So that for all network activity, the availability of data is very important to a system that can continue to run correctly.

Classical security is not important enough to include all aspects of computer network security at the time now. These things can be combined in some cases by more
important that you can create a computer network security can be improved with more
the case under this include:
  • Non-repudiation
  • Authenticity
  • Possession
  • Utility

Non-repudiation.
Every action is done in a secure system that has been monitored (logged), this is means the use of tools to undertake the system working should. "Log" also can not be separated from the security "system" that is the case an infiltration or attack others will help the process of investigation. "Log" and record time, for example, an important part of the evidence in court if caught and cracker brought to justice. For this reason the "non-repudiation" regarded as an important factor in the competence security network.

Authenticity
This aspects associated with method to declare that the information truly authentic, the person who provides information or access is exactly the person is, or contact the server that we are truly the original server.

0 comments: