Orbit-Computer Solutions.Com

Computer Training & CCNA Networking Solutions
 

Network Security.

Why is Network Security Important?

Fact: where there is a network, wired or wireless; there are threats. Some people are easily put off setting up a home or office network with the fear that any thing stored in their hard drive could be accessed by neighbours or hackers. The types of potential threats to network security are always evolving, and constant computer network system monitoring and security should be an ultimate priority for any network administrator.
 
If the security of the network is compromised, there could be serious consequences, such as loss of privacy, and theft of information.

When it comes to network security, the main concern is making sure that any wireless connections are protected against unauthorised access.

Most business transactions are done over the Internet, In addition, the rise of mobile commerce and wireless networks demands that security solutions become flawlessly integrated, more transparent, and more flexible.
 
 Network attack tools and methods have evolved. Back in the days when a hacker had to have sophisticated computer, programming, and networking knowledge to make use of rudimentary tools and basic attacks. 
Nowadays, network hackers, methods and tools has improved tremendously, hackers no longer required the same level of sophisticated knowledge, people who previously would not have participated in computer crime are now able to do so.

 
Why is Network Security Important?



 

Types of Network Threats and Attacks

 

As the types of threats, attacks, and exploits grows, various terms have been used to describe the individuals involved. Some of the most common terms are as follows:

i.   White hat- These are network attackers who looks for vulnerabilities in systems or networks and then reports these vulnerabilities to the owners of the system so that they can be fixed. They are ethically opposed to the abuse of computer systems. A white hat generally focuses on securing IT systems.

ii.   Hacker- This is a general term that is used to describe a computer programming expert. These are normally used in a negative way to describe an individual that attempts to gain unauthorized access to network resources with malicious intent.

iii.   Black hat or Cracker- The opposite of White Hat, this term is used to describe those individuals who use their knowledge of computer systems and programming skills to break into systems or networks that they are not authorized to use, this of course is done usually for personal or financial gain.

iv.   Phreaker- This terms is often used to describe an individual who manipulates the phone network in a bid to perform a function that is not allowed. The phreaker breaks into the phone network, usually through a payphone, to make free or illegal long distance calls.

v.   Spammer- This is often used to describe the persons who sends large quantities of unsolicited e-mail messages. Spammers often use viruses to take control of home computers and use them to send out their bulk messages.

vi.   Phisher- Uses e-mail or other means to trick others into providing sensitive information, such as credit card numbers or passwords. A phisher masquerades as a trusted party that would have a legitimate need for the sensitive information.
 
 
 
 
 
 
Sign Up For Post Updates

* required



*



Email Marketing by VerticalResponse
 
 
Resources
 
vlsm ebook
 
 
 
(c) Copyright 2013. Orbit-Computer-Solutions.Com. All rights reserved.    Web Links    Privacy Policy  Contact Us
The information provided on this website is for informational purposes only.
Orbit-computer-solutions.com makes no warranties, either expressed or implied, with respect to any information contained on this website.
Orbit -computer-solutions.com reserves the right to change this policy at any time without prior notice.
Cisco and All related product mentioned in any portion of this website are the registered trademarks of Cisco.com their respective owners. Microsoft Windows and All related products mentioned in any portion of this website are registered trademark of Microsoft Corporation.