Network Security:For years, organizations have neglected network security like small town residents don't lock their doors. Open doors have been closed and locked as the proliferation of the Internet and the global web has affected this attitude to networking.
Why is security important?Securityis important, because computer systems and networks contain a wide range of information and resources that need to be protected. When you use your credit card to make an online purchase, you trust that the online merchant is providing you with a secure connection at the time of the transaction and that there is no risk to the information you provide. employees trust Security to protect their personal information, such as their social security number or family information. The student makes sure that the computer is accessible and that the program is running each time he enters the results of the experiment. These are some of the reasons why network security is essential.
1. Protect information and resources in such a way that businesses or organizations can continue to operate without problems or interruptions.
2. Confidentiality of personal information such as medical records is guaranteed
3. Protects against identity and credit card theft.
4. Facilitates the flow of work processes without interruptions and disruptions in the work and gaming of family members, students and employees of the organization.
5. It deters computer hackers from launching further malicious attacks.
Using the protection capabilities of the operating system:Operating systems have many capabilities that ensure system stability. Some of the options that can be configured are:
1. Require every user registered on the network to log in with a strong password.
2. Use the best forms of authentication and encryption your operating systems can offer when users log on to the network.
3. Use digital certificate protection for network connections. Digital certification is necessary to verify the authenticity of transmissions between network computers, that is, to make sure that the devices being connected are really themselves.
4. Configure permissions for folder and file security.
5. Avoid public resource protections such as public access rights.
6. Set up security policies for users, such as requiring a "hard" password and locking out a user's account after a certain number of failed network logins.
7. Set the highest protection level available on the system for the wireless network.
8. For remote connections, especially wireless networks, use a Virtual Private Network - VPN.
9. Use disaster recovery technologies such as backup for regular backups.