User talk:Ahmad Alabdrabalnabi

Network Securities and Vulnerabilities With changing society and the increasing incidences of hackers and intrusions, companies are providing ways to ensure that the business is safe and the information secured. This is why static IP is imperative to many companies. Network security is one of the most popular necessities in the internet today. Because of the many threats that can enter a site and affect other sites, security should always be considered by administrators. In fact, when a system has no network security, it becomes vulnerable to these threats and viruses. It can run slowly and eventually create errors so hackers can easily access it and destroy the entire system. Network security is a concept that supports the system of any company. This is a also a simple assessment of what a company can do to safeguard the system of hackers or threats. This is a major topic for any company especially the big ones who need such to protect information that are confidential. When network security is not prioritized well by a company, a hacker (may be hired by a competitor) can obtain access to significant or sensitive information which can be a consequence of data damage and even destruction of the entire system. AN advisable network security is when the administrator utilized numerous layers of security before the main database can be accessed. It is perceived that the more levels of security, the more protected the system is. The system administrator is the primary in charge of securing the system; thus, also have the privilege of accessing the entire system, before work starts. It should be noted that system administrators should be highly skilled in system security and should be well trusted by the company. This will prevent unauthorized persons from accessing the company’s profile or information (Kaminsky, 2010). Network security entails anti-virus software that allows protection to many system networks. Network security functions in a straightforward manner. Basically, the system first recognizes the user of the administrator with the help of the so-called authentication procedures; this is the username and the password. However, what makes network security vulnerable is not the programming but the passwords used by the users. This is the reason why passwords should not be ignored by users. A simple yet bad password can be hacked by intruders and can break the system instantly (Rogers, 2010). The Development in Network Security Because the need of network security is steadily rising in the market, it has evolved through time creating more options for the users’ needs. In fact, 2GIG Technologies revealed in an article its latest security network, that is, the application of Go! Control; a home security and management system. This considers a negotiated agreement that dealers of the said network system should also gain access to the leading security products in the market. 2GIG’s security network system is labeled Go! Control because of its features that help users protect their computers. Go! Control is the “first self contained, all in one security and home management system” that is also equipped with the latest technology of Liquid Crystal Display or LCD. When the said technology is unenergized, the crystals utilizing two polarizing filters for directing light performs the occurrence of natural background color. Go! Control also is equipped with Global System for Mobile Communications (GSM). This is a digital cellular technology that is founded by Europe’s TDMa since 1992. Although developed in 1980, long before technology progressed, this GSM has ‘radio enabling 2-way voice calls over cellular”. Being an automated control device, it also Z-wave module which is responsible in the automation system of such. Because of this features, 2GIG’s security does not only provide protection to the system, but cost saving benefits for the company (Business Wire, 2010). Another technology on network security is developed by Solera Network which has announced recently its collaboration with Sourcefire, Inc. in June of this year. Being one of the leading creators of network forensics products, this partnership will help provide company the detailed analysis of any security event performed. The said collaboration is again an efficient system for providing summary of any security event while helping the users understand in full detail the events before the and after the security event is performed. Sourcefire, being one of the distinguished companies in intrusion detection and prevention of threat is an excellent partner in providing quality service to the users. The partnership also means a combination of immediate and real-time network forensics and platform turns which will help users combat the everyday attacks encountered by the administrator. This is system is like a surveillance for all types of industry that need protection. The Sourcefire IPS “vulnerability and anomaly-based examination procedures” supports the critical incidents during network traffic so as to help prevent threats from attacking the system. Solera Networks, on the other hand focuses on documentation, indexing and replaying all network traffics in order for administrators to understand what made the computer vulnerable. This is considering the equipment is utilizing 10Gb networks in order to perform its full capability. The Solera DeepSee Forensics, in turn, provides a detailed account of any intruder or information that crossed the network for analysis and examination (Network Security 2010). Providing Security to Problems It is imperative to have a defined strategy in achieving its goals. Aside from the set of goals, the team should also delineate the layout of the networks and define its boundaries. This means that the administrator must be abreast of how the system is interconnected and how to add new users while securing data. Since a single person is responsible in handling the entire network, it is the discretion of the company if it may need to seek for a signed statement that the staff really understood the grave offense that they will face once the commitment of not safeguarding the data is broken. The policy can also incorporate rules of installing outside programs without license that may be subject of intrusion; or USB drives that are not properly scanned by the anti-virus provided by the company (Network Security 2010). However, regardless of the many policies created by the company, the administrator must also ensure that these rules are properly carried out by the staff. This therefore must incorporate religious inspection of the network and the information that provides the name of employees that keep track of the SOP. This will provide awareness to people and will help administrators know who are not following the policies of the company. This improved awareness on security threats; thus providing concrete solutions to problems of virus or intruders (Barry, 2010). As mentioned earlier, in order to relate group of computers in a network, there are maintenance procedures that should be met and should be guaranteed by the administrator. The abovementioned procedures and other processes can definitely guarantee the protection of the server. The company should also provide policies on security or protection of their databases. This security policy enumerates the instructions and precedence that the entire team managed to discuss. Since more and more computers connect with each other through this administrator, it is imperative to note that this procedure must keep all confidential files or data safe. Encouraging the presence of security policy sets the protocols of company once the system is under attacked by malicious intruders, spywares or virus (Rogers, 2010). The policy must also consider what of the company’s data or information need protection. It should definitely include compromised areas and the areas that are more vulnerable to attacks. Goals should be formulated hand in hand in order to understand what are the data need to be safeguarded. Once the policy is formulated, it is imperative for the team to be committed to their goals and start the procedure of backing up all important data. At the very least, when the network security was not able to perform well, files are kept in tack through its back-up procedures. Of course, of site storage systems are best options. Blue ray discs and even tapes can be used for storage. Smaller data can be kept by the head of the IT team in an online service working background. However, it should be made sure that these off-site areas are sites that can be trusted by many companies. Moreover, the manager must also know how to access properly these files since he is responsible for keeping the data. In this case, complications will be prevented and data lost will be prevented (Network Security 2010). Conclusion Network security is a relevant subject that entails more attention because of the advancement in technology and changing lifestyle. Security threats and vulnerabilities are evaluated to provide the necessary technology needed to answer the problems. The security technology is usually software founded this is the reason why common hardware devices can be utilized. However, because of the many intruders and hackers, network security is not as impressive as it may seem. However, it is but positive to note that many IT experts are trying their best to create useful software that help combat problems on vulnerabilities. Example of such is the IPV6 that usually helps internet users. More helpful software is provided and combined together to provide more protected to large scale attacks (Daya, n.d.). Attacks do not only affect company users but also computers of individuals in home. The abovementioned rules can also be applied by home users to ensure that their data are properly stored. This part of the privacy control of people especially if confidential data are stored in the computer. Since intruders slowly destroy the system without you knowing it, it should be understood that home users are also responsible for keeping their files safe. In fact, this is a simple process of also updating the virus system of the computer. Risks are everywhere so one must ensure that the system is properly protected. Being careful and watchful of one’s data is the best security to prevent virus from attacking the computer (Carnegie Mellon University, 2010).

References Barry, D. Network security facing dual challenge. Retrieved 27 Nov. 2010 from Help Net Security: http://www.net-security.org/article.php?id=1537 Business Link. Network security issues - Business Link. Retrieved 7 Mar. 2011 from Farlex, Inc. : http://www.businesslink.gov.uk/bdotg/action/detail?itemId=1073791298&type=RESOURCES Business Wire. 2GIG Technologies Announces Addition of Security Networks. Retrieved 27 Nov. 2010 from The Free Library: http://www.thefreelibrary.com/2GIG+Technologies+Announces+Addition+of+Security+Networks.-a0228936242 Carnegie Mellon University. Home Network Security. Retrieved 27 Nov. 2010 from Software Engineering Institue Carnegie Mellon: http://www.cert.org/tech_tips/home_networks.html Curtin, M. Introduction to Network Security. Retrieved 27 Nov. 2010 from InterHacker: http://www.interhack.net/pubs/network-security/ Daya, N. Network Security: History, Importance, and Future. Retrieved 7 Mar. 2011 from University of Florida Department of Electrical and Computer Engineeringhttp://web.mit.edu/~bdaya/www/Network%20Security.pdf Kaminsky, A. What is Network Security?. Retrieved 27 Nov. 2010 from Conjecture Corporation: www.wisegeek.com/what-is-network-security.htm Naiana, T. Data Security In Banking Informatics System. Retrieved 7 Mar. 2011 from Farlex, Inc. : http://steconomice.uoradea.ro/anale/volume/2007/v2-statistics-and-economic-informatics/46.pdf Network Security. Leading IDS Solution Got Active Network Forensics Integration. Retrieved 27 Nov. 2010 from Network Security: http://www.netsecure724.com/ Rogers, D. Network Security the Risks of Having An Unsecured Network. Retrieved 27 Nov. 2010 from Farlex, Inc. : http://www.thefreelibrary.com/Network+Security+the+Risks+of+Having+An+Unsecured+Network-a01073981815 Vedi, A. Network Security Issues. Retrieved 7 Mar. 2011 from Farlex, Inc. : http://ax3.in/network-security-issues.html