Network security involves initiating hardware and software protective measures that prevent networks from unauthorized access, destruction, modification, leakages or misuse by ensuring the continued integrity of network systems and data within. This is achieved through integrated layers of defense that are put out on the network to detect and prevent potential threats from accessing network resources. Each network security layer acts to implement different policies and controls that act as a sieve just allowing authorized personnel and software to access the network.
A security policy is made up of objectives that lay down the rules for users and administrators plus the system requirements and management structure to ensure the security of computer and network systems. These policies work to link management objectives and security requirements by translating the management’s position in regards to network systems security. They stipulate the user obligations in protecting information and also specifies mechanisms for meeting these obligations by providing a baseline for configuration of the computer and network systems. Security policies comprise of governing, end-user and technical policies with each housing requirements for different users accessing the network within an organization.
Network systems are prone to attacks because they all poses a degree of vulnerability in their configuration. Any knowledgeable individual with the ability to use readily accessible tools on the internet can cripple a network system. The ever growing need of having software that is rich in features and easy to use creates a challenge in the security protocols that can be put in place (King & Bittlingmeier, 2003). Some of the most common attacks include reconnaissance attacks, Trojan horses, phishing, IP spoofing, ping sweeps, port scans, rootkit, computer worms, etc.
References
King Todd & Bittlingmeier David. Security and Training Guide. Indianapolis, IN, 2003: Pearson IT Certification.