Network Security Threats

Network Security Threats

It can be troublesome to get rid of malware like viruses, Trojans, and worms once they infect a computer system or network. Therefore, it is always best to prevent them from infecting your computer in the first place. Network security aims to protect information exchanged over a network or the Internet. It deals with aspects such as prevention and detection of unauthorised access, termination of misuse, Denial of Service (DoS) and upholding the confidentiality and integrity of data. A secure network protects not just your desktops and laptops but also the handheld and wireless devices (such as smartphones and tablets) that connect to your home network.

In order to create a secure network environment where your computers and devices can be free from attacks, the following measures should be given due consideration.

  • Back up the data regularly
  • Store the data on a reliable medium
  • Update the software patches
  • Install SSL certificates to stay ahead of threats
  • Upgrade Firewalls with ACLs (Access Control Lists), Demilitarised Zone (DMZ), Proxy and routers Network security threats are of two types:

Passive threats: Passive threats or attacks involve attempts by an intruder to monitor a communication; in order to steal sensitive information that two devices transmit over a network. During a passive attack, the attacker does not affect the communication. Email, file transfers and client/server exchanges are some examples of transmissions that can be monitored by passive attackers. Passive threats are sometimes referred to as eavesdropping attacks or sniffing and snooping attacks.

 Active threats: Active threats involve modification of transmitted data and attempts to gain unauthorised access to networked computers. In an active attack, the attacker alters the information stored on a computer, prevents users from accessing the network or web resources and pretends to be a legitimate user to gain access to the network.

Leave a Reply

Your email address will not be published. Required fields are marked *