Network Security/Network Security
A second important function of analyzing the operation of the company’s infrastructure and preventing unauthorized access (UAI) to information resources by intruders.
Depending on the scale and type of business (small, medium or large), the use of network infrastructure implies the integration of hardware and software solutions that ensure the performance and security of the network.
Building Principles
There are 4 basic principles of network security design at the object of informatization:
- Protection of equipment connected to the network infrastructure. Antivirus solutions with regular database updates, firewalls with traffic filtering and blocking of unwanted subscribers, etc.
- Equipment should be fault-tolerant and provide for the possibility of quick recovery. The presence of redundant components in critical nodes is implied.
- Systematic monitoring of the entire company infrastructure to detect vulnerable points. The system should also provide detailed information about any software or hardware component of the equipment.
- Continuous monitoring of network channel bandwidth. This ensures timely blocking of unwanted traffic, and also allows for manual load balancing.
- Critical nodes of the organization’s infrastructure must ensure high availability in case of any threat or attack on the company. This is achieved by creating a second independent site (data center), which replicates data from the first one in synchronous mode.
are used as protective measures.
.
Network security tools
There are 2 types of network attacks according to the status of action: active and passive. They can also be internal or external. Active and passive.
In any case, it is recommended to use the following measures to prevent:
- proxy servers;
- hacking threat detection and prevention systems;
- defenses against targeted attacks;
- inter-network screens;
- network monitoring systems;
- VPN.