Network - what does the name signify? A picture of interlinking lines or roads is perhaps the first thing that flashes in your mind. Well computer network is also the same thing. It is a mechanism by which various computers in a terminal is connected to each other with or without a hardware line.
This network allows a person to access his office or home computer from anywhere in the world. Sounds great!! Well the advantages do come with its shortfalls. Before we move on, to the various type s of threats that plague the computer network. Let us first understand the different types of network. UCCP (Unix to Unix copy) - it was one of the oldest form of network that was used to connect two computers using the UNIX platform. Later on however it was used by PC's, Mac's Amiga's etc. The dynamics of this network was relatively simple and it used dial up system to connect two computers. This network system has witnessed a journey down south after the advent of the Internet. Today UCCP network is only used by people to copy files. Internet - today people use the Internet even before they have properly learned to speak and walk. But what is an Internet. it's nothing but a network of interconnected computers which is linked with a central host used for exchanging facts and information. The Internet works b using a open protocol known as the TCP/IP. Now there are various ways that this TCP/ IP protocol can be thrown at risk.
Since TCP/IP is a open network it is difficult to determine from where the packets originated. The authentication proof is absent which makes it vulnerable to outside threat. There is another threat called IP spoofing where a particular sender uses the IP address of another sender and uses it to send potentially harmful content. the most dangerous of all these is IP session hijacking where a hacker actually hijacks the session of a user and uses his IP to do anything with his account.
Now that we know about network security, let us understand how a network security works. A network security works by using various hardware and software components that are installed in the computer to ensure safety of information. This is accomplished by using anti virus and anti spy ware software. By using firewalls which stops a person from having unauthorized access into your computer. by identifying attacks from fast spreading threats in the web world and lastly by Virtual private networks (VPN's ) which are used to make remote access login more safer.
So far so good, but on the flip side the management of big companies should be very cautious while implementing network security. Firewalls should in no way hamper the independent working environment of an employee and should not interfere with a persons right to access information for his official or personal usage