Tuesday, August 21, 2007

Network security between tradition and development

The variety of services that can be offered by the World Wide Web (Internet) payment of government institutions and businesses should work when building their internal local area to make it compatible features and infrastructure-and strategic-Altekenekeh to qualify to connect to the Internet. However, the association with such extensive network posing new challenges might not give those institutions importance deserves, which may lead to the melting of information and confidential data between the fingers of some inquisitive, snipers and universally known as “Hackers.”
That connectivity, or any other external networks is a natural line with what the world is witnessing of important changes for the exchange of electronic information. It provided all institutions, networks and Internet services internal e-mail to exchange information between the staff and other foreign To achieve full readiness of the Internet era when he says loudly, However, the hacker has become a place where open mining on the information and burying their noses long cursing anything on the Internet, will come out of the network in the event of penetration unless satisfied arrogance access to confidential information or trade conventions of that institution.
Acting some quarters regrettably, the security of information is only part of the “traditional” in the structure of the network, and devices and programs that protect the network from intrusions by the complement to the traditional side, forgetting that the structure of any network based on long experience, The literature and research and studies very many and complex technical projects in the area of networks, all coalesce to make a note of new networks we perceive and comprehend and understand it correctly. It did not stand on a small hill announcing that its ability to development and modernization, but is continuing to provide new every day which makes him great credibility and great interest in various circles computer. The evolution of data networks succeed in science, the search for loopholes and gaps that may appear but is subject to continuous updating, which is also expecting a devastating war between us - friends network - and friends unwanted They Alhakers. So that means hostilities also evolve with us and the Internet arena actual war.
Therefore, information security has become a “tradition” according to some rumors, or what might be published by some newspapers, magazines and others specializing in network security specifically. But should it calls “evolutionary” and understood very well that I was assigned by the President of the Foundation, which operates the care its own security network.
Talking on the topic to the first point, which does not give sufficient attention when building network with the knowledge that they must be on top of the list, and is a “valuation” or evaluation, we must work on the assessment of the electronic properties Foundation which we work, and develop a clear security lines and features based on this evaluation, and summed up the process in countless electronic data relating to the company and resting places in the organizational structure and ways to move from one place to another in the same institution, and determining the powers of access, and thus begin to sketch the outlines of the network security first, then move to the opposite side in the evaluation process, and is part of the Internet, where we know the needs of the institution in which we work from the services provided by the Internet, and what is the actual need of such services that might need it, Will allows employees full Internet browsing? Are there sites will be prohibited on the staff of the institution to achieve protection of the sites that throws Files espionage and viruses? Or simply browsing to e-mail? How are security control incoming messages to the network, especially as it easiest ways to spread viruses? Conversely, is there data on the internal network wishing to participate with others using the Internet? For example : your company has no branches around the world has Clavk Msaulk direct exchange of information among themselves, Are you fully aware of this? Because the slightest mistake may submit such information to intruders on a gold platter.
After the completion of a project to extend internal network in the enterprise, and after that believes that things are going well and see the smile on your boss a clear and direct what I have done to secure the site, took the opportunity and ask him this proposal, which I think it is important to add to the “important points to build a network” and summarized the proposal at the meeting for all employees in the institution of the lecture “technical” on the occasion of the introduction of the new network, She explains at length move by the Center for Information Systems for the introduction of local area network services, which would benefit the employee and the institution together and ways to maximize those services, then move to the point of security and protection in the new network and gravity data exchange and information from the internal network to the Internet, As emphasis is placed on maintaining the password used by the employee to enter the network. The definition of employee is also correct procedures to be taken when the suspected presence of an interloper long poke his nose inside the network, so underestimate the least amount of risk, It should not frighten employee in the event of loss of data files or special institution during the conversation other people on the Internet because it will not recognize that the future employee exposures at the same event. The team of technical information institution-and perhaps you are one of them - must be fully aware of actions to be taken when confronted with these incidents because we are talking here about information security.
To identify and understand the output strategy “valuation” or evaluation is a very important means to identify destinations Foundation funds are spent to protect the security of information, and for more information on this aspect, I recommend you see the Site Security Handbook issued by the Group Network Working Group of the Internet Engineering Task Force.
Success in achieving security policy incomplete estimate the financial cost may need to educate staff in the institution because the employee others cultured technically and technology institution will carry huge financial burdens-loss may be capable of bankruptcy institution that commercial, or officials submitted their resignations to the other - in the event of a breach of security procedures for the network, and that the institution must appoint a technical adviser specializing in information security and networks to provide consulting help in taking appropriate decisions based on an institution’s needs. and dealing with the full knowledge of the hacking potential security of the network to access data while the institution was deep in sleep Carefree. We must work to correct this rapid Counsel for the network if any, programs operating programs such as firewalls and encryption information Firewalls Encryption and legitimacy to get information and Authentications needs addendum report which may require the institution. The protection network and information security and data security will direct Msaulk desired to be achieved before him to fall asleep.
NOTE: This is a machine translation.

No comments: