Self Imposed Network Vulnerabilities

Most computer networks contain a combination of public and private data. A properly implemented security scheme protects all the data on the network while allowing some data to be accessed by outside entities, usually without the ability to change that data (for example, a corporate website). Other data, such as payroll information, should not be made available to the public and should be restricted only to specific users within the organization. Network security, when properly implemented, secures the corporate data, reduces the effectiveness of hacking attempts, and ensures that systems are used for their intended purposes. Networks designed to be freely available to the public need to be secured to ensure accuracy of the information and availability to the public. Additionally, properly securing a network ensures that network resources are not used as an attack point against other networks.

Security attacks occur and damage networks because of the following three main reasons:

• Lack of effective network security policy

• Network configuration weaknesses

Technology weaknesses

0 0

Post a comment