Chapter 4 Computer Security
Chapter 4 Computer Security
Chapter 4 Computer Security
There is a significant need for network security in a computing environment to protect data and
information from unauthorized users. There are three key components of any network security
that must be in place. These are Confidentiality, Integrity, and Availability, also known as CIA
triad. Confidentiality ensures that the data is not intercepted by hackers when it is being
transmitted on a network. Integrity makes sure that data is not changed, damaged, or manipulated
during the transmission over a network. Availability is also a security service that ensures that the
1. Network Security Policy: Network security policy is a written document that stipulates the access
privileges and limitation of authorized users. This essential document also describes the network
security measures that should be taken periodically. For example, the occasional carrying out
2. Password Policy: The password policy emphasizes that the password should not be very simple
and associated with a user’s name and his/her birth specification. Instead, it should be strong
enough to thwart password attacks such as Dictionary attacks, Rainbow Tables, or Brute-force
attacks. A strong password should consist of at least 8 characters that involve upper and lower case
Page 1 of 10
letters, special characters, and numbers. In addition, employees should be obligatory to change
3. Using a Multilayer Security: Multilayer security is the act of securing the network with a
combination of multiple security tools such as the deployment of antivirus program, firewalls, and
4. Deploying SIEM: Security Information and Event Management or SIEM, in accordance with the
Gartner, is a security tool that supports threat detection and incident response through the real-
time collection and historical analyses of events from multiple events and data sources. SIEM
helps organizations to secure networks and prevent threat actors from infiltrating the network by
alarming analysts through security alerts. Therefore, SIEM should be a part of a corporate network
security system.
5. Keeping Network Up-to-Date: Threat actors often find loopholes in corporate network
security by capitalizing the older versions of the operating system, software, device drivers, or
network devices. To prevent this situation from happening, organizations must run a timely update
to keep their operating systems, device drivers, software applications, and other critical tools up-
to-date.
6. Providing Training to Employees: Human is the weakest link in any network. That’s why hostile
actors carry out social engineering and phishing attacks against humans. However, businesses
should conduct a training program for employees to educate them against potential threats and
proactive measures to avert these threats. For example, the users should be prevented to use social
7. Physical Precautions: Ensuring the physical security of network infrastructure is also essential.
For example, DNS server, data server, and other critical systems and network devices should be
placed at a secure facility where physical controls such as mantrap and biometric locks must be
deployed.
8. Cryptography and Wi-Fi Security: The data must be encrypted before sending it to other places
over a network. Wi-Fi network should also be secured with digital certificates.
Page 2 of 10
NB: DUFFERENT research STUDY article is based on ensuring network security in a
computing environment. The researcher pointed out the various attributes which are highly
significant to protect data and information from unauthorized users. As a result, it is evident that
cyber threats are greater in number and sophistication and, therefore, networks are vulnerable to
these notorious attacks. However, if organizations take some proactive measures, then network
Nb: Network security protects your network and data from breaches, intrusions, and other
threats. Here are the network security basics to secure business networks.
Page 3 of 10
properly secure its network. Therefore, it’s important to familiarize yourself with best
practices and different types of network security.
There are multiple ways in which companies can secure their network:
Page 4 of 10
Passwords: Appropriate passwords, password management tools, and two -factor
authentication are just some examples of how companies can better secure their networks.
Network safety is only as strong as the weakest password.
Network security tests: Security experts can gauge the overall state of your network
security measures as well as the risks facing your system. A security audit, vulnerability
and security scanning can all help to identify risks and offer routes for you to improve
network safety and protect your business.
Another great solution in the ALSO portfolio is Workplace Security, which is designed
for all businesses. The essence of the solution is easy implementation and effective
management of processes and products, while reducing total costs in the long term. Mail
security as well as endpoint and network security are the three pillars and network security
basics that should be in place to prevent attacks.
To protect organizations against data loss, backup & recovery should be an integral part
of an IT disaster recovery plan. By adding the workplace security solution to their
portfolio, ALSO partners have the opportunity to show their customers just how reliable
their services are.
10 proven ways to secure a computer network.
1. Install and Monitor Firewall Performance
Page 5 of 10
A firewall is designed to block unauthorized access to computers and networks. In essence, a
firewall is a set of rules that controls network traffic — incoming and outgoing. Computers and
networks that pass these rules are granted access, and those that don’t are walled out.
Firewalls are becoming more and more sophisticated (as are hackers), and some of the newest ones
are integrated network security platforms that consist of different approaches and encryption
methods, all working to prevent breaches and malicious activity.
It’s been recently recommended to change passwords whenever there’s reason to suspect
they’ve been compromised, and annually even if they appear to remain secure. Changing
passwords too often can lead to confusion and delays, leading employees to reach out to IT for
Many businesses now require two-factor authentication to connect to the network. In addition to
entering a username and password, users may also need to enter a code they receive via text or by
another means to connect to a system or Wi-Fi network.
The technology collects and analyzes information from network devices, endpoint logs and threat
intelligence feeds, identifying security incidents, policy violations, fraudulent activity and other
Page 6 of 10
threats. In order to respond more quickly, these solutions employ a high degree of automation to
enable security teams to quickly identify and respond.
More advanced than antivirus software, endpoint detection and response is part of a modern,
layered and proactive approach to cybersecurity to defend against ever-changing cyberattacks.
With a VPN, only those authorized to access your systems will be able to do so. A VPN
can dramatically decrease the likelihood of hackers finding a wireless access point and
wreaking havoc on your system.
Page 7 of 10
Even so, the occasional spam email may make it through, especially if a hacker is mimicking
someone you know, like a professional colleague or company you do business with. Employees
need to use their common sense filters in addition to any spam filter software.
The thought of a hacker getting inside your networks is a major cause for alarm. Imagine, however,
their surprise when all they find is a bunch of gibberish? Encryption can protect sensitive data
on Windows or Mac operating systems using software specifically designed to mask your IP
address. You can identify whether a website has been secured using encryption by looking for
“https” in the address bar along with a padlock icon.
Some quick tips for securing both personal information and sensitive work data include turning
off Bluetooth, never using unsecured public Wi-Fi and following the same advice for complex
personal device passcodes as you would for your work computer systems.
Page 8 of 10
When you’re managing your IT internally, the pressure is on to make sure you’re adequately
protected against hacking and viruses. While having all these measures in place and ensuring
employees are following best practices, it’s still difficult to keep up with the latest cyber threats.
One of the best ways to overcome these challenges is to enlist the help of a technology
management provider that stays updated on the latest threats and whose job it is to make your
systems as secure as possible. When you work with a technology management provider, you
get laser-focused monitoring and attention 24/7.
Page 9 of 10
Effective system security depends on creating a workplace environment and organizational
structure where management understands and fully supports security efforts, and users are
encouraged to exercise caution. The security manager leads this effort.
Page 10 of 10