First of all, what is a network?
The network we refer to here is the computer network, which has so many definitions from too many sources whether on the internet or elsewhere. Simply put, a network is the inter-connection of cables and other communications media, connectivity equipment such as switches and routers, electronic devices such as computers, printers, scanners, plotters, etc., for the purpose of sharing data and resources.
Whoa! Now, that doesn’t sound simple at all, does it? Alright, let’s give it a second try…
A Network is the inter-connection of communications media, connectivity equipment, and electronic devices for the purpose of sharing data and resources.
Now, that wasn’t too hard, was it? And here’s the second question…
What is Security?
This one is easy, as the word security means safety or safekeeping, protection or well-being.
So simply put, Network Security refers to any undertaking designed to protect the network.
Why do we have to protect or “Secure” the network?
We need to protect the network because there are constant threats against the “resources” we share in the network. These could be valuable information or data about our employees and clients, or more importantly about our products or businesses. Most of these threats come in the form of:
* Viruses, worms, and Trojan horses
* Spyware and adware
* Zero-day attacks, also called zero-hour attacks
* Hacker attacks
* Denial of service attacks
* Data interception and theft
* Identity theft
In order for us to fully understand what “Network Security Solution” is all about, we must also understand how Network Security works. Because there are a variety of threats, there is no single solution. We need multiple layers of security, so that if one fails, the attacker would have to deal with the next layer.
Network Security Systems are usually composed of many components of both software and hardware which are designed to work together to improve security and minimize maintenance. The software must be relentlessly updated to prevent from new threats.
These components include:
* Anti-virus and anti-spyware
* Firewall, to block unauthorized access to your network
* Intrusion prevention systems (IPS), to detect and block attacks
* Virtual Private Networks (VPNs), to provide secure remote access