Networks are critical to an organization's success for any business, both large and small. Lisa Bock reviews the goals of a network that include ensuring availability, scalability, manageability, and security for the clients.
- [Narrator] We live in an exciting yet challenging time. Administrators face numerous challenges to protect the infrastructure. Network environments are complex and can include mobile phones, cloud computing, virtualization, social media, and the internet of things. Coupled with the challenges, cyber threats are becoming more aggressive, complex, and sophisticated. Attackers range from the disgruntled employees to crime rings, and nation states.
Network attacks include cyber crime, hactivism, extortion, and espionage. Every organization and government is a potential target. The attacks are highly organized by skilled and motivated players, and have resulted in exposure of massive amounts of sensitive data such as credit cards, medical records, intellectual property, passwords, and state secrets. Networks are critical to an organization's success for any business, both large and small.
Today our internet-based ecosystem demands that business networks are available nearly 100% of the time. Business networks must be able to adjust to changing traffic demands, and maintain constant response times. In addition, they have to be agile, to respond to unexpected security incidents. Whether you're expanding a current network, or designing a completely new infrastructure, today's networks require careful planning.
Network design goals include the following. Networks need to be available nearly 100% of the time. A single failure should not significantly impact network performance. The network should grow to meet the ever changing demand for more hosts on the network. No matter how good the design of the network is, the network administrator and security specialist must be able to manage the complexity of the network.
Design security from the onset. Careful planning includes consideration for all network resources including security devices, access control lists, and intrusion detection. These are critical to safeguarding network resources. Knowing about all the possible risks that can occur we can see that the network is a pretty insecure environment. To meet the daily requirements is becoming very complex, and many times on a limited IT security budget.
As a result, network administrators place security as a top priority. Safeguards include administrative, physical and technical controls that an organization must incorporate into the security compliance plan. Everyone plays a role in keeping an organization's information and security safe and secure. In addition to the logical controls, physical security should also be a consideration.
Once someone has access to a physical device, this is a game changer. Physical access will allow someone to change a password and obtain full access to the network. Physical security involves preventing theft, destruction, or tampering of computers, network hardware, or devices. Examples include cutting a fiber-optic backbone, theft of a computer or handheld device, or removing RAM or components from a desktop or a laptop.
Obvious safeguards include making sure to restrict access to wiring closets and data centers. And in addition high security areas should have additional methods such as security cameras, biometrics, and visible signage. It's important to note, to keep in mind that we can't completely eliminate security risks. We can only reduce overall risk. A layered approach is essential, as no single product, device or software application can make an organization secure.
Network security comes from a combination of products, services, best practices, and well-written security policies. Companies are hyper vigilant and recognize the importance of a secure network. However, the landscape changes often. As a result, the networking team should complete an annual network assessment in order to determine whether the requirements of the network are in line with the business goals.
- Security principles and terms
- SIEM technology
- Common security threats
- Social engineering
- Data loss prevention
- Cryptographic concepts
- Symmetric and asymmetric encryption
- Hash algorithms
- Network topologies, CAN, WAN, and SOHO
- Securing a virtual environment