Introduction to Computer Network Security
With
all of the vital personal and business data being shared on computer
networks every day, security has become one of the most essential
aspects of networking. No one recipe to fully safeguard networks against
intruders exists. Network security technology improves and evolves over
time as the methods for both attack and defense grow more
sophisticated.
Physical Network Security
The
most basic but often overlooked element of network security involves
keeping hardware protected from theft or physical intrusion.
Corporations spend large sums of money to lock their network servers, network switches and
other core network components in well-guarded facilities. While these
measures aren't practical for homeowners, households should still keep
their broadband routers in private locations, away from nosy neighbors and house guests.
Widespread
use of mobile devices makes physical security that much more important.
Small gadgets are especially easy to leave behind at travel stops or to
have fall out of pockets. News stories in the press abound of local
residents having their smartphones stolen in public places, sometimes
even while using them. Be alert to the physical surroundings whenever
using mobile devices, and conscientiously put them away when done.
Finally,
stay in visual contact with a phone when loaning it to someone else: A
malicious person can steal personal data, install monitoring software,
or otherwise “hack” phones in just a few minutes when left unattended.
An alarming number of ex-boyfriends/girlfriends, spouses, and neighbors get accused of such acts.
Password Protection
Passwords
are an extremely effective system for improving network security if
applied properly. Unfortunately, some don't take password management
seriously and insist on using bad, weak (meaning, easy to guess)
passwords like “123456” on their systems and networks.
Following
just a few common-sense best practices in password management greatly
improves the security protection on a computer network:
- set strong passwords, or passcodes, on all devices that join the network
- change the default administrator password of network routers
- do not share passwords with others more often than necessary; set up guest network access for friends and visitors if possible
- change passwords when they may have become too widely known
Spyware
Even without physical access to the devices or knowing any network passwords, illicit programs called spyware can
infect computers and networks, typically by visiting Web sites. Much
spyware exists on the Internet. Some spyware monitors a person’s
computer usage and Web browsing habits and reports this information back
to corporations, who use it to create more targeted advertising. Other
spyware attempts to steal personal data. One of the most dangerous forms
of spyware, keylogger software captures
and sends the history of all keyboard key presses a person makes, ideal
for capturing passwords and credit card numbers. All spyware on a
computer attempts to function without the knowledge of people using it,
thereby posing a substantial security risk.
Because
spyware is notoriously difficult to detect and remove, security experts
recommend installing and running reputable anti-spyware software on
computer networks.
Online Privacy
Personal
stalkers, identity thieves and perhaps even government agencies monitor
people’s online habits and movements well beyond the scope of basic
spyware. Wi-Fi hotspot usage
from commuter trains and automobiles reveal a person’s location, for
example. Even in the virtual world, much about a person’s identity can
be tracked online through the IP addresses of their networks and their social network activities.
Techniques to protect a person’s privacy online include anonymous Web proxy servers, although maintaining full privacy online is not fully achievable through today’s technologies.