Are Your Operations and Networks Secure? Wiki

Introduction to Network Security
Everyone in the connected world knows what a network is; it is a system of interconnected computers, or at least now they do. The basic idea of networks is allow people remote access to geographically distant resources without having to be physically present. It has also been designed to send data back and forth, to stay connected.

There are large networks and small networks, but size is irrelevant in terms of importance of data. The purpose of network security, quite simply, is to protect the network and its component parts from unauthorized access and misuse. Networks are vulnerable because of their inherent characteristic of facilitating remote access. For example, if a hacker wanted to access a computer not on a network, physical access would be vital. However, with networks in the picture, it is possible to bypass that particular security aspect.

Therefore, it is vital for any network administrator, regardless of the size and type of network, to implement stringent security policies to prevent potential losses.

http://www.brighthub.com/computing/enterprise-security/articles/69275.aspx

Why is Network Security Important?
The purpose of network security is essentially to prevent loss, through misuse of data. There are a number of potential pitfalls that may arise if network security is not implemented properly. Some of these are: http://www.brighthub.com/computing/enterprise-security/articles/69275.aspx
 * 1) Breaches of Confidentiality: Each business will identify with the need to keep certain critical information private from competitor eyes.
 * 2) Data destruction: Data is a very valuable commodity for individuals and enterprises alike. It is a testament to its importance when the proliferation of backup technology available today is considered. Destruction of data can severely cripple the victim concerned.
 * 3) Data manipulation: A system break-in may be easily detectable, as some hackers tend to leave tokens of their accomplishment. However, data manipulation is a more insidious threat than that. Data values can be changed and, while that may not seem to be a serious concern, the significance becomes immediately apparent when financial information is in question.

Key Actions Users Should Take to Protect Themselves
Familiarize yourself: Training/Books

»Security Certifications - » CISSP, SSCP, Security+, etc.

»Computer Forensics

»Ethical Hacking

»Malware, Spyware, Viruses

»FISMA Compliance, Policies, etc

»PKI, Encryption, Smartcards

»Windows Security Guides

»HIPAA, SOX, CISP, etc.

Technology in the News
http://rss.cnn.com/rss/cnn_tech.rss