Intranets and extra nets are effective solutions that are installed through partitioning of networks, without having large amount of expenditure or changes in the existing architecture.
The threats to computer networks may be from many prospective users. There can be dishonest students who sneak in to the network without detection from any user.
There may be instances that somebody is sneaking into ad-hoc collaboration for accessing confidential data. But besides the threat of hacking, how you can avoid the strike from dishonest employees who wants to leak internal sensitive data to a foreign subsidiary.
How to guard against dangers such varied?
Making use of multiple firewalls might be one solution however this option is highly expensive because of the investment costs for installing many firewalls.
Furthermore, the logic of a firewall is always binary. This logic is sometimes faulted, especially with the development of extra nets, which allows outsiders to gain access the "other side" of firewalls.
What choice is available for network security experts?
Do you want to work in an unsafe network or obtain and install firewalls that are too expensive and yet gives ineffective network security?
One choice available is to take advantage of the network itself. The networks have features or functions that can filter, normally switches and routers, and giving yout the choice to install distributed network security at the network level.
The security function is used by partitioning the network. This answer has important advantages: no systematic addition of machinery and no disruption of architecture. To partition a network, simply divide into sets of sub-networks, domains, and then install filters on routers or switches that interconnect these subnets.
Gather devices that are used in filtering in the network and make them Security Policy Enforcement Points. The devices that control the flow of traffic required between different areas are filtering devices by the use of Access Control List.
The application of network partitioning is essential because this can give many filtering system. This would provide network security within an intranet in a lot of departments and projects. It can be of great assistance in management of complex access to internet platforms and also useful for extra nets or star networks.
The partitioning of the network is the first step towards the use of encrypted IPsec tunnels, that are based on a selection of flows, so that it can give security to individuals.
The threats to computer networks may be from many prospective users. There can be dishonest students who sneak in to the network without detection from any user.
There may be instances that somebody is sneaking into ad-hoc collaboration for accessing confidential data. But besides the threat of hacking, how you can avoid the strike from dishonest employees who wants to leak internal sensitive data to a foreign subsidiary.
How to guard against dangers such varied?
Making use of multiple firewalls might be one solution however this option is highly expensive because of the investment costs for installing many firewalls.
Furthermore, the logic of a firewall is always binary. This logic is sometimes faulted, especially with the development of extra nets, which allows outsiders to gain access the "other side" of firewalls.
What choice is available for network security experts?
Do you want to work in an unsafe network or obtain and install firewalls that are too expensive and yet gives ineffective network security?
One choice available is to take advantage of the network itself. The networks have features or functions that can filter, normally switches and routers, and giving yout the choice to install distributed network security at the network level.
The security function is used by partitioning the network. This answer has important advantages: no systematic addition of machinery and no disruption of architecture. To partition a network, simply divide into sets of sub-networks, domains, and then install filters on routers or switches that interconnect these subnets.
Gather devices that are used in filtering in the network and make them Security Policy Enforcement Points. The devices that control the flow of traffic required between different areas are filtering devices by the use of Access Control List.
The application of network partitioning is essential because this can give many filtering system. This would provide network security within an intranet in a lot of departments and projects. It can be of great assistance in management of complex access to internet platforms and also useful for extra nets or star networks.
The partitioning of the network is the first step towards the use of encrypted IPsec tunnels, that are based on a selection of flows, so that it can give security to individuals.
About the Author:
Curious to understand about data center security? If that's the case better go through network security right now.
No comments:
Post a Comment