By definition Network Security is the protection of networks and their services from unauthorized modification, destruction, or disclosure, and provision of assurance that the network performs its critical functions correctly and there are no harmful side-effects. Basically meaning that network security makes sure that you are the ONLY one how can use and gain access to your network. Which helps you to keep intruders or hackers from getting to your information on your computer.
Today, people do a lot of tasks online. People can do banking and shopping right from their computer. With these privileges comes the need to input important information(such as credit card numbers and account numbers) into web pages where you don’t know who’s reading the information on the other side or who is spying on what you do from a separate location.
As the Internet has grown so has the intelligence and capabilities of hackers. Software programs have become more and more complicated making it harder to find a small hole or virus. Without proper security software, all it takes is for you to download a free virus-filled application off the Internet and run it. However, even with proper security software hackers can develop new methods of getting into your computer, which makes it of the most importance to constantly update your security software.
Passwords are keys you use to access safeguarded information, such as personal information, online accounts, banking information, etc. In the online world, passwords are the main way of keeping hackers away from your information. It’s the hardest thing for another person to find out. Without passwords, what would protect our information online? E-mail addresses? How easy is it to figure out your friends email address? It is important to make sure that your password is something that nobody else will not be able to figure out easily. For example, you shouldn’t make your password your name since all of your friends will be able to login to your online accounts and see your information.
What makes a strong password? There is a lot of criteria to include when making a strong password.
There are certain types of passwords that you want to make sure NOT to use.
Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The risks to users of wireless technology have increased as the service has become more popular.
WEP stands for Wired Equivalency Privacy. WEP comes in different key sizes. The common key lengths are currently 128- and 256-bit. The longer the better as it will increase the difficulty for crackers. Your WEP key is basically your password to access your network. This password is one of the most important passwords you can have. Check out the password section for more information on creating a safe and strong password.
Your SSID (Service set identifier) is the name used to identify your wireless network. By default your wireless router probably broadcasts your SSID meaning when it sends out the signal it also sends out the SSID so that computers that pick up the signal can pick up the name of the network. This makes it easy for auto-detection of your wireless network but it also makes it easier for people to jump on your network. You can disable the broadcast of your SSID and the only thing you have to do is manually enter that name on all the computers you have connected to your wireless network. It is much more difficult for a person to try to get on your network if they cannot even see it in the first place.
Even though you think the internet is the best thing in the world, it too has its risks. you see there are many people who want too damage your life and your computer. you hear a lot on the news about identity thief involving computers and that sends a chill. Even when people do hear about these risk they think that it won’t happen to them and forget abot it. you should always be informed about the latest news involving how you can protect yourselves.
Having a secure websites is necessary for shopping online and online banking. there are many easy ways to tell if a site is secure and encrypted. first detail you should notice is it has “https” at the beginning of the URL. the website should have a “s” which means that any infomation is encrypted. most browsers include a lock icon in the browser to show that it has encryption, but you have to make sure that it isn’t just a picture.
Your browser is an important step to protect you form unwanted internet troubles. a good browser should help you protect against phishing and other dangers of the internet. browsers are regularly updated to include patches of known security risks. they send out fixes that cover up holes in the browser’s code so hackers can’t take over a computer and steal information. it is a good idea to always check for browser updates to get the latest and most secure edition of your browser.
Most routers allow you to set one of two different types of filtering, IP or Mac Address. Use IP Filters to deny LAN IP addresses access to the Internet. This type of filter involves entering the IP addresses of the computers on your network so that Internet access can ONLY be granted to those computers. Mac Address filtering is similar. However, IP addresses are assigned to computers and MAC addresses are assigned to network hardware. In MAC address filtering you simply enter the MAC addresses of the network hardware used on each computer into a list and the router will only grant Internet access to those pieces of hardware. Mac address filtering is more specific, because computers can carry more than one MAC address. For example, a computer may carry an Ethernet card MAC address as well as a wireless card MAC address, so you could disable the computers wireless access, but not the wired access.
Virtual Server is used to allow Internet users access to LAN services. Virtual Servers can be added to the list. They can also be scheduled and set on timers.
Some routers allow you to create parental controls and forbid the access to certain web pages. You can enter specific URL’s or domains, which are more general and forbid access to any web pages coming out of that domain.
A DMZ(Demilitarized Zone) is used to allow a single computer on the LAN to be exposed to the Internet. DMZ’s are created by entering the IP address of a specific computer that you want to have access to the internet. DMZ’s are used if you have a network of computers, but only want to have one exposed to the internet. DMZ’s still allow communication between computers on the network.