In this article we will discuss Wireless Broadband, will make brief discussion on Wireless Broadband, In last article we discuss about Powerline Networking.
Network security is an integral part of computer networking, regardless of whether the network is limited to a home environment with a single connection to the Internet or as large as a corporation with thousands of users.
The network security that is implemented must take into account the environment, as well as the tools and requirements of the network. It must be able to secure data while still allowing for the quality of service that is expected of the network.
Securing a network involves protocols, technologies, devices, tools, and techniques to secure data and mitigate threats. Threat vectors may be external or internal. Many external network security threats today are spread over the Internet.
The most common external threats to networks include:
Viruses, worms, and Trojan horses – malicious software and arbitrary code running on a user device
Spyware and adware – software installed on a user device that secretly collects information about the user
Zero-day attacks, also called zero-hour attacks – an attack that occurs on the first day that a vulnerability becomes known
Hacker attacks – an attack by a knowledgeable person to user devices or network resources
Denial of service attacks – attacks designed to slow or crash applications and processes on a network device
Data interception and theft – an attack to capture private information from an organization’s network
Identity theft – an attack to steal the login credentials of a user in order to access private data
It is equally important to consider internal threats. There have been many studies that show that the most common data breaches happen because of internal users of the network.
This can be attributed to lost or stolen devices, accidental misuse by employees, and in the business environment, even malicious employees. With the evolving BYOD strategies, corporate data is much more vulnerable. Therefore, when developing a security policy, it is important to address both external and internal security threats.
I am Hamza arif, and i am excited to learn new things, i am well focused for my work and always try to explore new things. My graduate is in BS (Telecom) and i am expert in Networks and working on new technology is my passion i work a lot on AI (Artificial Intelligence) Augmented Reality and many other projects.