Contact us today!
217-428-6449

Network Solutions Unlimited Blog

A Brief Overview of Network Security

A Brief Overview of Network Security

The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multiple endpoints, understanding the basics of network security is helpful when implementing and employing network security systems. Today, we take a look at the parts of your network, their functions, and what you need to do to protect them.

Network Hardware
Your business’ computing network consists of, at the very least, two connected machines set up to share resources. Most of the time, a business network consists of centralized computers called servers, and endpoints called workstations. Major networking components (working backward from the endpoint) include, network switches (that allow multiple workstations to be connected in packets); a router (that allows for wired or wireless connection to the network); and the modem (that connects the network to the Internet). On your network can be all types of other accessories (printers, scanners, copiers, and more).

Today, wireless networks have been deployed to provide additional mobility. In this case the router, which would have to have Wi-Fi capabilities, allows mobile endpoints (laptops, smartphones, tablets, and IoT devices) to connect to, and share the files on, an organization’s network. This promotes mobility by allowing the sharing and use of files without being physically connected to the network.

Network Protocol
The network protocol is a set of rules that work to control communications between devices connected to the same network. They make connections and set rules for data packaging for both sent and received messages. Popular protocols include:

  • Transmission Control Protocol and Internet Protocol (TCP/IP)
  • Address Resolution Protocol (ARP)
  • Domain Name System (DNS)
  • Secure Shell (SSH)
  • File Transfer Protocol (FTP)
  • Dynamic Host Configuration Protocol (DHCP)
  • Hypertext Transfer Protocol (HTTP)
  • Hypertext Transfer Protocol Secure (HTTPS)
  • Internet Group Management Protocol (IMAP4)
  • Post Office Protocol version 3 (POP3)
  • Simple Mail Transfer Protocol (SMTP)

There are many more, and every protocol is basically the building blocks of a deliberate interaction. Each protocol works to connect one part of a computer to another. Much like a bank has procedures in place to help keep your money safe, protocols are the procedures at work to keep your data safe.

Securing TCP/IP is especially important. TCP/IP communications are made up of four layers that work together. When a user wants to send information across networks, the information is passed through each layer, each adding data. Each layer features a header and a payload. The header contains layer-specific information, while the payload consists of the information that has come from the layer above it. To illustrate this a little better, we’ll describe the four layers in TCP/IP communications:

  • Application Layer: This layer sends and receives the information for particular applications, with protocols such as DNS, HTTP, HTTPS, and SMTP. Each application has to have its own specific protocol.
  • Transport Layer: This layer of connected (or connectionless) services are for transporting application layer services between networks and works to assure that connections are reliable. TCP and User Datagram Protocol are commonly used in the transport layer.
  • Internet Layer: This layer routes the data packets across networks. Internet Protocol (IP) is at the heart of this layer. IP specifically allows information streams to be broken up into segments known as data packets (known mostly as “packets”) and works to define and establish the Internet, as we use it, through addressing and routing.
  • Network Access Layer: Finally, the network access layer is in place to define the method of use within the scope of the local network link. It adds the protocols used to define the relationships used to transmit and receive data packets from the other layers.

With so many moving parts every time you send and receive information over the Internet (and within your own Intranet), you can see how difficult it is to keep the network free from threats. Now that you’ve got a small introduction to what each layer in your TCP/IP-run command does, we can now look at the vulnerabilities (and fixes).

Vulnerabilities
The main security problem with any type of network is the dreaded “unauthorized user”. An attacker can connect through an unsecure hub/switch port. As a result, wireless networks traditionally are considered less secure than wired networks, as they can be accessed without a physical connection. Once in, a nefarious actor can steal valuable information, deny service to legitimate users, or spoof the physical identity of the network to steal more data. Here are a few TCP/IP vulnerabilities:

  1. ARP spoofing - Used to deliberately steal sensitive information, or to facilitate denial-of-service-attacks, session hijacking, man-in-the-middle attacks and more.
  2. Port scanning - Used to see what services are available to exploit.
  3. IP spoofing - Sending packets from what is seemingly a trusted address, while sending malware or stealing data.
  4. DNS spoofing - The Domain Name System associates domain names with IP addresses. So devices that connect to the Internet can have their DNS spoofed and reroute the info to a different IP address.

What to Do About It
Once the “bad” data has been sent to you there is very little you can do. That’s why we tell everyone that they need to be proactive about securing their IT. At Network Solutions Unlimited, we can help you meticulously maintain your software, monitor your files, permissions, and access, and deploy today’s strongest network and cybersecurity strategies to keep threats from hampering your business. For more information, contact us today at 217-428-6449.

Know Your Technology: Computer Forensics
How to Balance Your IT’s Value Against the Cost
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Hiring/Firing App store Hard Drives Relocation Keyboard Shortcuts Testing Troubleshooting Update Unified Communications Analysis Document Management Two Factor Authentication Antivirus Best Practice Battery Phishing Emails Networking Computer Care Google Maps Virtual Reality Internet Exlporer Spyware Business Management IT Support App Going Green Humor Saving Time Chrome Spam History Computing Infrastructure Information Technology Management Legal Google Docs NFL Electronic Medical Records Data Breach PDF Mobile Security Professional Services Business Continuity Tech Support Computer Accessories Utility Computing SMB Upgrades Cortana Personal Information Budget Worker Commute Cost Management Language OneNote HBO Hard Drive IT Services USB Information Windows 10 Credit Cards Internet Search Computing Tablets Network Automation Robot Work/Life Balance Users Word WIndows Server 2008 Communications Remote Workers Data Protection Miscellaneous User Error Worker Content Tip of the Week Microsoft Office Hacking Router Physical Security Loyalty Email Hosted Solutions Books Students Unsupported Software Spam Blocking Emergency Data Loss Vulnerability User Tips Edge Google Assistant Projects MSP Backup Microsoft Excel Wasting Time Printers Outlook IT solutions Display Commerce Downtime Apple Retail Chromecast SaaS Gmail Entertainment Google Drive Streaming Media How To Password Big Data Safety Internet exploMicrosoft Telephone Systems Hackers Content Filter Touchpad Keyboard Windows 10 Money VoIP Hosted Solution Bandwidth Rootkit Windows Cybersecurity Browser Quick Tips Mobile Software Legislation Cast Public Cloud Collaboration Proactive IT Mobile Device Management Holiday Content Filtering Productivity Data storage Security Cameras Law Enforcement Root Cause Analysis Office Tips Managed IT Shadow IT Reputation Updates Applications Government Monitors Sales Dark Web Employer-Employee Relationship Data Recovery Administration File Storage Value Operating System Wireless Technology Health Colocation Ciminal Project Management Advertising Employee-Employer Relationship Recovery Computers eWaste Samsung Phone System Payroll Financial Hard Disk Drive Evernote Network Security Private Cloud Artificial Intelligence Excel WannaCry Risk Management Innovation Specifications Privacy Windows Ink Paperless Office Marketing Managing Stress Data Security Black Market PowerPoint Machine Learning Scalability Sync Social Media Scam Computer Fan intranet Tech Term Saving Money Comparison Data Theft Device Security Accessory Admin IoT Two-factor Authentication Passwords Touchscreen IT Management Adobe Windows 7 Google Identities HaaS Wireless Charging Websites WiFi Camera Business Apps Internet of Things Communication Managed IT Services Gamification Server Thank You Managed Service Microsoft Word Virus Android Training Firewall Charger Data Storage Data Encryption Files Managed IT Services Licensing Social Engineering Mobile Device Public Computer Laptop Mobility Business Owner Vendor Monitoring Cloud Computing Managed IT Service Alert Security Smartphone Television Instant Messaging Gadgets Hybrid Cloud Audit VPN Company Culture HIPAA Bring Your Own Device Smartphones Gifts Fraud The Internet of Things Peripheral Virtualization Congratulations iOS CrashOverride Computer Forensics Best Practices Politics Sports Conferencing Wasting Money Avoiding Downtime Remote Computing Business Technology Business Intelligence Hyperlink Mobile Devices Consultant Technology Nanotechnology WPA3 hacker Maintenance Cybercrime Financial Technology Smart Technology Unified Threat Management File Sharing Windows 10s Virtual Assistant Screen Mirroring Transportation Printing Customer Regulation Blockchain Alexa for Business Remote Monitoring Audiobook Memory Facebook Lifestyle IT Solutions Application Shortcut Co-Managed Services Bluetooth Proactive Software as a Service Connectivity IT Service Virtual Private Network Devices Automobile Ransomware Techology Hardware Twitter Wireless Cloud How to Flexibility Webinar Storage Assessment Video Games BDR Wi-Fi Productivity Wireless Internet Monitor Experience Office Upgrade Patch Management End of Support Data Backup Access Control FAQ Compliance Computer Workplace Tips Telephone Disaster Recovery Data Management IT Support Identity Theft Efficiency Education Data Privacy Benefits Save Money Employer Employee Relationship Human Resources Managed Service Provider Meetings iPhone IT budget Identity Office 365 Save Time Solid State Drive Chromebook Business Computing Microsoft Malware Smart Tech Settings Travel Amazon Cleaning Outsourced IT Workers Vendor Management BYOD Redundancy Augmented Reality Cache Small Business