Network security tips
After setting up a functional network, securing it is a primary concern of any network administrator. These days there are so many types of network threats that securing your network from each one requires comprehensive and planned effort. Negligence on any front will compromise your network security resulting in serious trouble. A good network administrator must consider all the following factors while trying to secure the network. These network security tips are really very much helpful for a network administrator.
Network Security Policy: It is a set of rules that governs the computer network access. It is a detailed document which addresses all aspects of Network access and security such as data access, use of browsers, e-mail attachments, use of passwords and encryption in an organization. First it determines which information and services are available and to which users. Also it describes a hierarchy of access i.e. defines each user is permitted to what level of data. Complete network security is designed and implemented as per this document.
Internet Access Control: Internet can be a bog source of attacks and viruses. The internet router or the proxy server which is directly exposed to the internet must have very tight security. Similarly users’ activities on the internet should be restricted as per company’s requirement. Unnecessary internet traffic slows down the overall network response even when it is not dangerous.
Virus Threat: Computer virus is a small program which when executed can perform different unwanted and harmful functions for a computer and a network. These can destroy computer hard disks, consume high memory and can deteriorate the performance of a network. Similarly a Trojan can destroy critical data. Worm is can cause the same damage as the Trojan and can even replicate itself on the network. All these can be prevented, detected and removed if a good updated antivirus is being used with latest pattern files. Scan all computers on regular basis to make sure that the network is virus free. Also restrict the use of USB as this can also be a big source of virus.
E-mail Scanning: Another big source of threat are the e-mail attachments. Users need to be trained not to open attachments from unknown senders and which have executable extensions like .exe, .com, .pif, .bat etc. Also use that e-mail software which has built in capabilities to detect malicious content and spam. Allow the antivirus program to scan the e-mails as well.
Network Monitoring Tool: A network monitoring system is capable of detecting and reporting failures of devices or connections. It normally measures the CPU utilization of hosts, the network bandwidth utilization of links, and other aspects of operation. At the same time, it monitors outside and inside data traffic and identifies any abnormal behavior or patterns.
Unwanted Applications: You must control which application a user is going to install on his computer. Users should not be allowed to download and install applications without permission. Free software on the internet normally contains malware or spyware which automatically installs malicious content on the user PC along with the software hence creating problems.