Network Secutiry

What is network security?

By definition Network Security is the protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects. Basically meaning that network security makes sure that you are the ONLY one how can use and gain access to your network. Which helps you to keep intruders or hackers from getting to your information on your computer.

Why is network security important?

Today, people do a lot of tasks online. People can do banking and shopping right from their computer. With these privileges comes the need to input important information(such as credit card numbers and account numbers) into web pages where you don’t know who’s reading the information on the other side or who is spying on what you do from a separate location.

How easy is it to break into your computer?

As the Internet has grown so has the intelligence and capabilities of hackers. Software programs have become more and more complicated making it harder to find a small hole or virus. Without proper security software, all it takes is for you to download a free virus-filled application off the Internet and run it. However, even with proper security software hackers can develop new methods of getting into your computer, which makes it of the most importance to constantly update your security software.


Passwords are keys you use to access safeguarded information, such as personal information, online accounts, banking information, etc. In the online world, passwords are the main way of keeping hackers away from your information. It’s the hardest thing for another person to find out. Without passwords, what would protect our information online? E-mail addresses? How easy is it to figure out your friends email address? It is important to make sure that your password is something that nobody else will not be able to figure out easily. For example, you shouldn’t make your password your name since all of your friends will be able to login to your online accounts and see your information.

Strong Passwords

What makes a strong password? There is a lot of criteria to include when making a strong password.

  • Length – All passwords should be long. Most places where you input a password will give you a number range of characters to include in the password. It always best to include the MAXIMUM number of characters. The longer the password the more possibilities a hacker has to go through before he/she gets to your password. If there is no range acknowledged, it is best to include 14 or more characters. Some places let you include a [space] as a character in the passwords. It is best to take advantage of that and create a password of multiple words.
  • Characters – Make sure to use all types of characters. The more different types of symbols used the harder it will be for a hacker to determine your password. Sometimes the place where you enter a password will tell you what characters/symbols you can use in your password. If you cannot use a wide variety of characters it is important to make the password longer to get the same degree of safety from it. It also important to use uncommon characters.
  • Think of making a password as choosing a word/phrase to use in hangman. The more unique the letters, the harder it will be for somebody to figure out. Make sure to use phrases that you will be able to remember, but others will not be able to figure out.

Passwords to avoid

There are certain types of passwords that you want to make sure NOT to use.

  • Avoid using passwords that have repeating characters such as “222222”, “123456”, “abcdef” or adjacent letters on your keyboard such as “asdfgh” or “qwerty”
  • Purposely mistaking look-alike symbols such as “l”(L) for “1”(one). Or words like “P@ssw0rd” that just look like the same word. Hackers are smart enough not to be fooled by these.
  • Do not use parts of your login name, real name, birthday, social security number, credit card number, or other important information that you are already trying to protect with that password.
  • Do not use words that exist in dictionaries of any language. Hackers have very good software that can quickly go through dictionaries of any language as well as backwards words, common misspellings, and substitutions.
  • Do not use the same password for anything more than once. If a hacker gets access to one of your passwords he/she will keep note of that password and try to use it later again.

Wireless Security

Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The risks to users of wireless technology have increased as the service has become more popular.


WEP stands for Wired Equivalency Privacy. WEP comes in different key sizes. The common key lengths are currently 128- and 256-bit. The longer the better as it will increase the difficulty for crackers. Your WEP key is basically your password to access your network. This password is one of the most important passwords you can have. Check out the password section for more information on creating a safe and strong password.

Broadcasting SSID

Your SSID (Service set identifier) is the name used to identify your wireless network. By default your wireless router probably broadcasts your SSID meaning when it sends out the signal it also sends out the SSID so that computers that pick up the signal can pick up the name of the network. This makes it easy for auto-detection of your wireless network but it also makes it easier for people to jump on your network. You can disable the broadcast of your SSID and the only thing you have to do is manually enter that name on all the computers you have connected to your wireless network. It is much more difficult for a person to try to get on your network if they cannot even see it in the first place.

Online Risks

Even though you think the internet is the best thing in the world, it too has its risks. you see there are many people who want too damage your life and your computer. you hear a lot on the news about identity thief involving computers and that sends a chill. Even when people do hear about these risk they think that it won’t happen to them and forget abot it. you should always be informed about the latest news involving how you can protect yourselves.

Secure Websites

Having a secure websites is necessary for shopping online and online banking. there are many easy ways to tell if a site is secure and encrypted. first detail you should notice is it has “https” at the beginning of the URL. the website should have a “s” which means that any infomation is encrypted. most browsers include a lock icon in the browser to show that it has encryption, but you have to make sure that it isn’t just a picture.

Malicious URL

Did you ever know that hackers can alter browser code to mislead you? this type of phishing can be very tricky to detect because everything looks normal. they can write JavaScript commands to change the way your address bar works. they can place a picture over a real site to make it look like you are going to a secure site. In some cases malicious URL details can be hidden by encoding techniques. This type of phishing is harmful for inexperienced users.


Your browser is an important step to protect you form unwanted internet troubles. a good browser should help you protect against phishing and other dangers of the internet. browsers are regularly updated to include patches of known security risks. they send out fixes that cover up holes in the browser’s code so hackers can’t take over a computer and steal information. it is a good idea to always check for browser updates to get the latest and most secure edition of your browser.

Router Settings

IP/MAC Filters

Most routers allow you to set one of two different types of filtering, IP or Mac Address. Use IP Filters to deny LAN IP addresses access to the Internet. This type of filter involves entering the IP addresses of the computers on your network so that Internet access can ONLY be granted to those computers. Mac Address filtering is similar. However, IP addresses are assigned to computers and MAC addresses are assigned to network hardware. In MAC address filtering you simply enter the MAC addresses of the network hardware used on each computer into a list and the router will only grant Internet access to those pieces of hardware. Mac address filtering is more specific, because computers can carry more than one MAC address. For example, a computer may carry an Ethernet card MAC address as well as a wireless card MAC address, so you could disable the computers wireless access, but not the wired access.

Virtual Server

Virtual Server is used to allow Internet users access to LAN services. Virtual Servers can be added to the list. They can also be scheduled and set on timers.

Parental Controls

Some routers allow you to create parental controls and forbid the access to certain web pages. You can enter specific URL’s or domains, which are more general and forbid access to any web pages coming out of that domain.


A DMZ(Demilitarized Zone) is used to allow a single computer on the LAN to be exposed to the Internet. DMZ’s are created by entering the IP address of a specific computer that you want to have access to the internet. DMZ’s are used if you have a network of computers, but only want to have one exposed to the internet. DMZ’s still allow communication between computers on the network.