Computer Network Security, especially if we connect a computer as a computer lab in the office or home computer network. Network security involves access authorization data in the network, which is controlled by the network administrator. Users select or have an ID and password or other authentication information that allows them access to information and programs within their authority. Network security includes a variety of computer networks, both public and private, which are used in daily work and communication transactions between businesses, government agencies and individuals.
If observed on the security of computer network security can be reviewed in terms of its form is as follows:
-
Hardware SecuritySecurity-related hardware hardware used in computer networks. Security hardware is often overlooked but is key to maintaining the network to remain stable. In the security hardware, servers and data storage should be a major concern. Physical access to servers and critical data should be limited as much as possible.
It would be easier for thieves to take the hard drive or tape backup of servers and data storage instead of having to press the software from the network. Garbage should also be considered because many hackers who come to the garbage company to find information on its computer network. One way to secure the hardware is placed in a room that has good security. Airways hole needs to be given attention because people just get into the server room through the channel. Cable networks should be protected so as not easy for hackers to bypass the cable and then connect to the computer.
Access to computers can also be restricted by security settings on the BIOS level that would prevent access to a computer, format the hard drive, and change the contents of the Main Boot Record (where the partition information) hard drive. The use of smart cards and hardware autentifikasiseperti fingerprint detector is also worth considering to improve security.
-
Security SoftwareAs the name suggests, it must be guaranteed is the software. The software we mean here can include operating systems, application systems, data and information stored in computer networks especially on the server. For example, if the server is only responsible to the router, do not need web server software and an FTP server installed. Limit the installed software will reduce the conflict between the software and limit access, for example if the router is also equipped with an FTP server, then people from outside with anonymous logins may be able to access the router.
Software to be installed must also have good security arrangements. The ability of encryption (data scrambling) is a specification that must be owned by the software to be used, mainly because the encryption 128 bit encryption with 56-bit systems should be solved with ease today. Some software has a security hole is the sendmail mail server and telnet applications. Sendmail has a weakness that can ditelnet without logging in port (25) and accessor can create an email with a fake address. Telnet application has deficiencies transmit data without encryption (data scrambling) so that when it can be tapped will be very easy to get the data.
The second thing to note is the password. Should set the minimum password length fatherly complicate memcahkan password hacker. The password will also be better if it does not consist only letters or angak, small or capital letters, but must be combined. Encryption can improve network security by randomizing passwords and usernames, either in the notes to the host as well as password and username that is passed the current network to log into another computer.
Routing can not be separated from security breaches. Disorder that often arises is the provision of false information about the routing path (routing in the IP header). Giving false information is usually meant to be a datagram-datagram can be tapped. To prevent such a thing, the router must be set to not allow source routing and routing protocols are included in or some sort of password authentication for routing information is obtained only from trusted routers.
Similarly introductory Computer Network Security, may be useful.