Vous êtes sur la page 1sur 24

INTRODUCTION

What is network security??


A specialized field in computer networking that involves securing a computer network infrastructure. Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work. A network security system typically relies on layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and appliances. All components work together to increase the overall security of the computer network.

DEFINITION:
Network security is an over-arching term that describes that the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification, or denial of the network and network resources. This means that a well-implemented network security blocks viruses, malware, hackers, etc. from accessing or altering secure information. The first layer of network security is enforced through a username/password mechanism, which only allows access to authenticated users with customized privileges. When a user is authenticated and granted specific system access, the configured firewall enforces network policies, that is, accessible user services. However, firewalls do not always detect and stop viruses or harmful malware, which may lead to data loss. An anti-virus software or an intrusion prevention system (IPS) is implemented to prevent the virus and/or harmful malware from entering the network. Network security is sometimes confused with information security, which has a different scope and relates to data integrity of all forms, print or electronic.

DIFFERENT TYPES OF NETWORK SECURITY


Wi-Fi Protected Access (WPA): WPA encrypts information, and checks to make sure that the network security key has not been modified.
WPA also authenticates users to help ensure that only authorized people can access the network.There are two types of WPA authentication: WPA and WPA2. WPA is designed to work with all wireless network adapters, but it might not work with older routers or access points. WPA2 is more secure than WPA, but it will not work with some older network adapters. WPA is designed to be used with an 802.1X authentication server, which distributes different keys to each user. This is referred to as WPA-Enterprise or WPA2-Enterprise. It can also be used in a pre-shared key (PSK) mode, where every user is given the same password. This is referred to as WPA-Personal or WPA2-Personal.

Wired Equivalent Privacy (WEP):


WEP is an older network security method that is still available to support older devices, but it is no longer recommended.When you enable WEP, you set up a network security key. This key encrypts the information that one computer sends to another computer across your network. However, WEP security is relatively easy to crack.

Authentication:
802.1X authentication can help enhance security for 802.11 wireless networks and wired Ethernet networks. 802.1X uses an authentication server to validate users and provide network access. On wireless networks,802.1X can work with WEP or WPA keys. This type of authentication is typically used when connecting to a workplace network.

MAC Address:
A Media Access Control address is a unique identifier assigned to network interfaces for communications on the physical network segment. Can be described as Ethernet hardware address (EHA), hardware address or physical address. It is assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism.

The advantage to MAC filtering is that there is no attachment cost to devices that connect to the network. The policy is set on a router or switch, and the equipment attached either is permitted or it is not. The person attaching the equipment has nothing to do. The disadvantage to MAC filtering is that it is easy to spoof due to the broadcast nature of LAN and WLAN, an advisory can sit on the wire and just listen to traffic to and from permitted MAC addresses. Then, the advisory can change his MAC address to a permitted one, and in most cases obtain access to the network.

Authentication:
One-factor authentication this is something a user knows. The most recognized type of one-factor authentication method is the password. Two-factor authentication in addition to the first factor, the second factor is something a user has. Examples of something a user has are a device that generates a pre-determined code, a signed digital certificate or even a bio-metric such as a fingerprint. Three-factor authentication in addition to the previous two factors, the third factor is something a user is. Examples of a third factor are all bio-metric such as the users voice, hand configuration, a fingerprint, a retina scan or similar. The advantage of using a 3 factor authentication is that it's made reassuringly sure that the person who is authenticating is the person who is authenticating through multiple layers of security. The disadvantage is that there is a possibility that the person trying to authenticate loses first or the second authentication, the process can also take time.

Firewall:
Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. It may be hardware or software. The advantage of a firewall is that the user can monitor incoming and outgoing security alerts and the firewall company will record and track down an intrusion attempt depending on the severity. Some firewalls can detect viruses, worms, Trojan horses, or data collectors. The disadvantage of firewalls is that they offer weak defense from viruses so antiviral software and an IDS (intrusion detection system) which protects against Trojans and port scans should also complement your firewall in the layering defense. A firewall protection is limited once you have an allowable connection open. This is where another program should be in place to catch Trojan horse viruses trying to enter your computer as unassuming normal traffic.

SECURITY ON CAMPUS
As a new or continuing college student, you will have plenty of things to think about. Heres another one: how can you assure your safety on campus? While most students get through four or more years of college without being threatened or harmed by on-campus crime, the unfortunate reality is that such crime is increasing. The Crime Awareness and Campus Security Act of 1990 mandated that colleges must compile annual statistics about crime on campus and make that information available to current and potential students and staff members. What that means is that as you are considering colleges, you can check out each schools crime data. You can learn about the types and frequency of crimes on campus and then use that information as youre preparing your list of questions for your campus visit. See the Department of Educations Office of Postsecondary Education crime data online at http://ope.ed.gov/security/main.asp. When you visit a college campus, ask both students and counselors very specifically what security measures the school has for assisting unaccompanied students walking at night, for handling threats, or for evacuations in the case of a violent incident or other emergency. What should you do if you hear someone making a threat or observe someone behaving in a dangerous or threatening manner? How are campus security personnel trained and what equipment do they carry? Does the school recommend (or allow) self-protection equipment such as pepper spray? In some cases, it is the municipal police that respond when there is a problem on campus. If so, visit with officers and ask about campus crime and response times. While youre at it, ask for their suggestions on how you can be safer at school. In addition to finding out what security measures are provided by the school, you also need to take responsibility for your own safety. Here are some common-sense safety tips:

Be aware of your surroundings. Look around as youre walking or riding your bike. Be especially vigilant when youre distracted, such as when youre texting or talking on the phone. Listen to whats going on around you. If you need to walk alone, leave the headphones turned off. Put the campus police phone number on all of your phones so you can dial it quickly if theres a problem. Walk, bike and park in well-lighted areas. Lock your car, both when youre in it and when you leave it. Always lock your room, both when youre in it and when you leave it. Avoid displaying obviously valuable items or wearing valuable jewelry. Go with a friend; its saferand its more fun. Tell someone where youre going and when you expect to be back. If youre working at night, on or off campus, find out whether other people will be around and arrange to leave with someone else. If you feel even slightly unsafe, even in the daytime, call campus security and ask for an escort. If they cant assist you, call a friend and wait in a safe, well-lighted place until they arrive. If you are being stalked, report it immediately to campus police and to the authorities at your residence. Be prepared to give as much description as possible. Carry and use a flashlight. Dont just shine it on the path directly ahead of you, but sweep it ahead and around you.
4

Consider carrying a whistle or a personal alarm. Much campus crime, including sexual assault by acquaintances, is associated with the use of alcohol. Be smart and just say no thanks. Pay attention to warnings. As colleges implement greater security measures, you may receive notices by text message, phone or e-mail. Take them seriously. The chances are good that you wont encounter trouble, but these simple cautions can make you safer and help you avoid problems that may be brewing around you.

MEASURES TO IMPROVE COLLEGE SECURITY


Preventing crimes and making sure students feel safe on campus are two of the most important objectives of any campus security organization. We at Guardly have composed a list of the top 25 measures that college security staff can employ to maintain in school safety. 1. If you do not already have a mass notification system then ensure you install one as soon as possible. Mass notification systems are highly prevalent among colleges and universities across North America. For example, a study conducted by Siemens of 77 high-learning institutions found that every single one had some type of mass notification system. MNS systems help prevent crime and we at Guardly recommend that security professionals investigate how they benefit campus safety. 2. When the school year starts send a mass notification to every student with the contact information for campus security services. 3. Make sure health facilities are up to date and that there is a campus physician onstaff at all times. The incidence of contagious diseases being spread on health facilities is startling. In fact, according to the Center for Disease Control there are 7 million infections and 99,000 deaths annually in the United States during hospital visits. Therefore, having extremely clean and modern campus health facilities with a campus doctor available 24/7 will improve the health of your whole college. 4. Make note of the places on campus where the most crimes occur and increase your security presence in those targeted areas. This increase may include extra security patrols and/or the installation of cctv cameras and emergency phones. Many universities realize the importance of increasing their security presence on university campuses. For example, a report by Purdue universityrecommends doubling the amount of security cameras on-campus. 5. In order to increase in school safety, ensure that the school administrators and professors are kept fully up-to-date on all criminal activity on campus. The staff and professors of your universities are in many cases on campus more than your schools students and as a matter of personal-safety, they have a right to know if there is a crime committed on campus. Additionally, they are instrumental in managing your school and communicating with the student population. Therefore, keeping them up-to-date on all criminal activity on campus will help them craft school policy, administer budgets and communicate with students, in such as way as to always keep in mind concerns about criminal acts on campus.
6

6. Make sure to employ the latest technology to protect your campus. Mobile safety apps can help your students feel safe at school and immediately notify campus police, with their location, should they experience an emergency. Our company provides a very cost-effective method of turning your students smart phone into a virtual blue light emergency phone which will drastically improve college safety. 7. Organize self-defense classes on campus. For example, the University of Ottawa has an on-campus self-defense program called Rape Aggression Defense. This program, which costing $20, is affordable for all students, specializes in teaching women self-defense in case of an attack on campus. The program is well integrated with school counselling services and the program instructors are well versed in the sensitivities towards students who may have been survivors of sexual violence. 8. Promote a zero-tolerance policy for sexual harassment, drugs, and other common on campus crimes. 9. Encourage female students to always keep pepper spray in case of an attack. 10. Ensure there is proper lighting on paths and secluded sections on campus. Having well lit paths is very important to maintaining and improving college campus safety. For example, A University of Minnesota study of its Duluth campus suggested that improving the lighting systems around certain targeted areas around campus could help reduce crime. 11. Check to make sure your campus wifi is always working so students can use personal safety applications, such as Guardly, in case of an emergency. The internet and mobile technologies have provided people with better ways to keep safe on campus. Location-based personal safety applications such as Guardly are committed to take advantage of these technological breakthroughs. 12. Frequently inspect your cctv cameras and emergency phones, ensuring your security equipment is working properly. 13. Provide top-notch training for new hires and continuing education for your more experienced security staff, in order to have well trained security personnel who can effectively combat crime on-campus. 14. In compliance with the Clearly Act make sure all crimes are reported to the proper authorities and that the campus community is made aware of all crimes committed. Jeanne Clearly was a 19 year old freshman who was raped and murdered on campus in 1986. In response the this heinous crime the federal government introduced a bill that demands universities gather and report all crimes committed on, or near the schools campus.
7

Electronic Security Solutions Making Colleges Safer


SECOM provides electronic security for schools to enable education in calm, safe conditions, where students can learn and teachers can teach with minimal disruption.

PRODUCTS: Intruder detection systems:


We understand the challenges faced when protecting public sector premises from unauthorised access and can provide an advanced intruder alarm system tailored to your needs. By using full integrated intruder detection technology SECOM can help you protect your premises and members of the public 24 hours a day, 365 days a year.

Intruder Alarm Systems:


We can develop, install, monitor and maintain intruder alarm systems tailored to your needs, helping to prevent break-ins, unauthorised entry and improving security. SECOM is a member of the NSI ensuring that when you choose one of our intruder alarm systems, you can be confident that it will meet demanding industry standards and the security requirements of your facility.

Reliable Intruder Detection Technology:


Having worked extensively with public sector organisations we appreciate the unique security considerations that affect public spaces and facilities. SECOM can work with you to find the intruder detection system which meets your requirements most effectively. By selecting advanced intruder detection technology and providing constant monitoring through a dedicate alarm receiving centre we can help you to protect your facility from threats.

Movement detectors:
Depending upon the requirements of your intruder detection system we can install passive infra-red or dual technology providing highly stable, intelligent detection which differentiates between human and animal movement.

Vibration detectors:
VAble to detect vibration at high and low frequencies and fitted to walls, doors and windows our vibration detectors ensure you are alerted at the earliest stages of a break-in allowing your personnel to respond swiftly and effectively.

Door Protection:
Ensure your intruder detection system prevents unauthorised with monitored door magnets which seamlessly integrate into your facilitys intruder alarm system.

Intruder Detection System Control Equipment:


As well as complete intruder alarm systems SECOM can install control equipment that fully integrates with your facilitys intruder detections system.

CCTV surveillance cameras


We have worked with a wide range of clients, providing reliable 24 hour surveillance equipment and CCTV solutions through a unique understanding of public sector security concerns.

We advise you where to place CCTV security technology


We can help you to plan and implement your entire CCTV solution. Advising you on the most effective combination of security cameras, lighting and recording equipment ensuring you can observe your facility and protect it from vandalism, theft or violence.

CCTV control equipment:


Whether it is small or large scale, our range of CCTV control equipment can be individually tailored to your specific requirements. We can offer traditional analogue CCTV systems or the most advanced digital technology, working with you to find the most appropriate solution for your budget.

Choose from a range of securty cameras:


We can fulfil your requirements with a range of security cameras for all purposes. From monochrome to colour, analogue to digital we can help you to find the surveillance equipment to integrate with your CCTV system.

Dome CCTV cameras:


Robust and discreet, dome surveillance cameras are an ideal solution for public sector buildings and public areas. SECOM dome security cameras are available as monochrome, colour and even colour switching. You can also obtain fixed or multiple view varieties, with features such as auto focus and 360 degree views which all combine to help you effortlessly monitor your facility, swiftly and efficiently. Surveillance cameras for all lighting levels: Ambient light levels are critical for image resolution which is why we can provide you with a range of surveillance cameras which offer medium to high resolution and effective operation in a variety of light levels. We also offer infra-red lighting for lowlight or dark areas.

Interactive visual response:


A cost effective and rapid response to security threats.Reduce threats to your facility with the SECOM Vision system, linking CCTV to our alarm response centre, and protect your employees with the innovative SECOM VisionGuard personal attack option.

SECOM Vision: Rapid Response to a Security Threat


SECOM Vision links your CCTV system to our alarm receiving centre to detect and deter intruders, offering a cost-effective alternative to on-site security guards. Seconds after a trespasser triggers an alarm our operators will be watching their every move on screen. At this point we can either issue a warning via loudspeaker, or contact the police. SECOM VisionGuard: 24hr security for staff and customers Empower your staff by equipping them with a personal attack button integrated with the VisionGuard system. When faced with threatening or abusive behaviour, the touch of a button will instantly link your CCTV cameras to our remote video receiving centre. From there, specially trained controllers can talk down potentially threatening situations via loudspeaker or summon the police. Our remote video receiving centre has the capability to receive all types of confirmation systems in line with current ACPO policy.

Access control systems:


We understand the unique security challenges faced within public sector buildings and can offer you a range of access control solutions to help you prevent unauthorised access. Through utilising access control systems such as voice and video entry phone to more advanced PIN number and card operated locks SECOM can help you to control and monitor access across single or multiple sites.

10

Reliable, secure and easy to use:


Whether you want to control access to a single door or to an entire building, SECOM will design the best access control system for your premises and train you fully in the use of the control equipment that manages the system.

Electronic locks specifically for our needs:


We can advise you on which electronic locks will be most effective and fully integrate them with your access control system. Whether it is concealed electronic locks or surface versions, standard release strikes or electro-magnetic locks, all are compatible with conventional access control systems.

Door Access Control:


We take into account your security requirements at every stage in the process and can install PIN or proximity readers which help to prevent unauthorised access throughout your premises. With SECOM access control solutions you also can set authority tiers to restrict access to certain parts of your facility, ensuring that only those with a predefined authority level can enter.

Smoke Fogging Systems:


Shielding valuables from view upon intruder detection. Designed with the special needs of the public sector in mind, our smoke fogging systems are pro-active devices that work with existing alarm systems, emitting smoke to hide valuables and prevent vandalism.

11

Catch intruders unaware and foil theft With the ability to release 135 to 400 cubic metres of harmless fog in just 30 seconds, the SECOM smoke fogging system catches intruders unaware. The smoke is monitored for density, giving just the right amount of protection to your facility. The smoke fogging system is sabotage resistant and will continue to work after receiving malicious damage. SECOM smoke fogging systems are 100% safe for humans, animals and will not damage property.

Physical protection:
Physical security fully integrated with your electronic security solution. SECOM offers an extensive range of physical protection products for the public sector to support our electronic systems. The physical security products provide a wholly integrated security solution to protect public sector buildings and equipment from robbery, vandalism, ram-raids and even gun violence.

High quality security products that are tailored to public sector security needs SECOMs robust physical security products are all developed from in-house factory designs and are manufactured and installed in a made-to-measure process. SECOM advises public sector clients on the levels of safety and security their premises require, which are determined by the threats against a building or equipment. The security solution may include: shutters, gates, grilles, anti-ram posts, cages, safes, bullet resistant screens and fencing.
12

SECOM makes its physical security products 'in-house' allowing us to also design and build one-off physical security solutions for almost any public sector requirement. All physical security equipment comes with a 12-month warranty and includes an optional service and maintenance package.

Remote Monitoring:
Remote monitored security and alarm response 24 hours a day.Achieve total peace of mind by having our highly trained staff monitoring your facility and your security system twenty four hours a day.Cost-effective alternatives to manned security Many organisations are paying far more than they need to for manned security. Most insurance companies insist that alarm systems are simply monitored to provide police response in the event of an incident, a requirement that can be fulfilled by our cost-effective remote monitoring service. Our 24 hour alarm response centre is connected directly to all UK police forces. We will make sure that our trained key response officer, the police or your key holder is called out to your facility whenever they're needed.

Reducing call outs to false alarms:


Our trained control centre operators deal with over 3000 customer calls each day and are adept at differentiating between real and false alarm activation. Consequently, our alarm receiving centre has won a prestigious Metropolitan Police award for reducing false alarms. False alarms can often be averted by employing some simple preventative measures. For information on steps you can take to reduce the occurrence of false alarms, see the related link at the bottom of the page.

Rapid response to real threats to security:


Remote monitoring is the key to rapid response, and a rapid response is the key to minimising damage to your facility and opportunities for theft. By using the very latest in telecommunication technology, you are assured that any activation is known about as it happens. A verified alarm will alert key holders, security officers or the local police force to attend the facility. This response is managed for you by our monitoring centre day and night, all year round, giving you complete peace of mind.

Service & Maintenance:


Total security support, servicing and maintenance, day or night.When you choose a SECOM electronic security solution, you will have complete confidence in your security system; we take care of your security system 24-hours a day, 365 days a year, with our maintenance and service programmes.
13

Buying a SECOM product is just the start. Our scrupulous after-sales and maintenance service means we're on hand to help you manage and maintain your security, so you know you can always rely on it. Find out more about our commitment to excellent customer service.

Benefit from a dedicated team of fully trained security system engineers Our dedicated team of fully trained engineers operate via our network of local offices, all of which are located in key locations around the country. As an NSI Gold member, all our electronic security systems comply with the latest industry standards, police and insurance requirements.

14

HOW CAMPUS ALERT WORKS?


College campuses are like small communities. They often have their own police and fire departments, an army of workers who maintain its buildings and infrastructure, and thousands of residents, also known as students. Just like any community, a college also needs its own campus alert system, which can quickly warn its residents of threats or provide other, less critical information in an efficient manner. Campus security has become more high-tech and proactive, reflecting this development. Modern campus security philosophy holds that officials can't rely on any single means to communicate. Redundancy and multimodal communications are watchwords. However, with these advances come new challenges and problems: information overload and the potential for the campus community to simply opt out of the network. In this article, we'll explore how campus alert systems work, their strengths and weaknesses and what the future might hold.

NEED FOR CAMPUS SECURITY:


The need for campus security is a relevant issue for all schools today. Parents and the media have all began to explore how to make campuses a safer place for elementary, middle school, high school and college students everywhere.

What Kind Of Campus Security Is Necessary?


The appropriate campus security is debatable. Some people feel that proper security will come with banning guns while others feel metal detectors will work. There are other less evasive ways to address college security; most of them is more organic in nature. We can keep security cameras out of college classrooms and still keep students safe.

Typical Security Need:


Various sorts of systems may be able to fill the campus security needs at college. Some of the ways that security can be increased at a campus is to focus on items that include:

Emergency and crisis preparedness School police staffing; on a lesser level school guards, adult hall monitors, schoolyard guards and instructors trained in basic defence operatives. Internal security that covers confidential items like office management and registration paperwork.

Campus and community collaboration for safety in not only the school but surrounding neighbourhoods.

15

Procedural Security Needs:


Procedures that are overlooked can also cause a need for campus security. Some procedural aspects of security that can be assessed and addressed if necessary include:

Staff and student awareness training regarding all aspects of safety and security Basic safety issues addressed; it does little good to address big issues if instructors can't locate a first aid kit or work a fire extinguisher A good system for planning for security issues which may include a school team safety committee Proper employee protection in place such as a workplace emergency action plan Zoning and property issues, such as signs up, fences, doors that lock and limited access to the campus

Social and Community Security Needs:


Increasing the community and social aspects of a school system can ultimately increase overall security without a school ever having to hire a new actual police guard. These sorts of techniques include:

Adequate health care services and or referrals on campus Proper mental health facilities or care providers on campus such as school psychologists and counselors Transportation, technology and tutoring services and on high school and upper level campuses career referrals and job placement assistance. Opportunities for parent and trained volunteer involvement

These may seem unrelated to campus safety but much of the crime on campuses is initiated by students themselves. Whether its a nine-year-old bully or an 18-year-old thief, crime can be prevented when students are and feel well-cared for.

The Social Awareness Of Youth:


One form of campus security that is underutilized is the student body. Students can actually provide a fair amount of campus security with the proper tools. Students have the ability to stop violence before it starts in many cases. Socially aware students who receive workshops on topics like bullies, rape, self defense, protocol for what to do if another student (or teacher) threatens violence, and how to be in groups not outside of them are all tools students can use to protect themselves and other students.

16

IMPORTANCE OF CAMPUS SAFETY ON COLLEGE CAMPUS


Every year, millions of students walk onto a college or university campus. They may be returning for another year, or it could be their first college experience. In both cases, these students come with one overall goal: to obtain a higher level of education. However, in order to ensure that students are provided the best possible opportunity with which to succeed in college, a safe and secure learning environment is essential. Whether it is a campus security walking a student to her car at night or a student having a can of pepper spray in her purse or pocket, security is important. It is for this reason that the importance of campus safety should be stressed throughout colleges and universities everywhere. Although the college and university campuses in our country do have security, the truth of the matter is students still experience crime and violence on campus. Incidents such as theft, assault, and rape are not uncommon among the institutions of higher learning in this country. Granted campus security does play a part in lowering the level of crime, but because there can never be enough security guards to ensure campus safety, students must know how to protect themselves from such dangers. There are many different measures and precautions a student can take in order to provide themselves a safer and more secure college experience. The simplest precaution a student can take is to be alert at all times. Although this may seem a no brainer, it is a very hard thing to do especially when you are preoccupied with friends or an upcoming exam. However, taking the time to look over your shoulder every once and a while or become aware of new environments you find yourself in can prove useful to your overall safety and well being. Another safety measure a student can take is never to be alone, especially during the night. Making sure to walk in pairs or larger groups is an effective way to deter anyone with negative intent to act. If the case were to be an attack actually occurring, students walking in pairs or in groups would have someone to aid in fending off the criminal or calling for help. Other preventive measures include letting others know where you are going and who you are going with as well as wearing reflective clothes when exercising at night so motorists can see you. The two tips mentioned above pertain to preventive measures and steps which a student can take in order to ensure a safer college or university experience. However, like so many victims of campus crime know, there are times when these steps are not enough to prevent an attack. In the event of this happening, students can then prepare to defend themselves with a variety of different options. Examples of this are things like taking a self-defense class, as many colleges and universities hold physical education courses in this area. Taking such courses can minimize or even negate any damage a student might experience in the event of an attack. Another option is for students to carry safety defense items such as pepper spray or a personal sounding alarm on their person. Pepper spray for college students can provide a window for escaping from an attacker and an alarm can alert anyone in the immediate vicinity to help or call for help. By taking these tips and precautions and applying them to your everyday college life you will now possess the ability to experience a safer and more secure college or university education.
17

MAKING YOUR NETWORK MORE SECURE


If you are setting up a home or small office network, here are some best practices you can follow to enhance the security of your computer and your network.

General network security recommendations:


The following are general security guidelines for all home and small office networks.

Keep your computer up to date:


To help keep the computers on your network safer, turn on automatic updating on each computer. Windows can automatically install important and recommended updates, or important updates only. Important updates provide significant benefits, such as improved security and reliability. Recommended updates can address non-critical problems and help enhance your computing experience. Optional updates are not downloaded or installed automatically.

Use a firewall:
A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through a network or the Internet. A firewall can also help stop your computer from sending malicious software to other computers.

Run antivirus software on each computer:


Firewalls help keep out worms and hackers, but they're not designed to protect against viruses, so you should install and use antivirus software. Viruses can come from attachments in e-mail messages, files on CDs or DVDs, or files downloaded from the Internet. Make sure that the antivirus software is up to date and set to scan your computer regularly. There are many antivirus programs available. Microsoft offers Security Essentials, a free antivirus program you can download from the Microsoft Security Essentials website. You can also go to the Windows Security software providers website to find a third-party antivirus program.

Use a router to share an Internet connection:


Consider using a router to share an Internet connection. These devices usually have built-in firewalls, network address translation (NAT), and other features that can help keep your network better protected against hackers.

Don't stay logged on as an administrator:


When you're using programs that require Internet access, such as a web browser or an e-mail program, we recommend that you log on as a standard user account rather than an administrator account. That's because many viruses and worms can't be stored and run on your computer unless you're logged on as an administrator.

Wireless network security recommendations:


If you have a wireless network, there are some additional security precautions that you should take.

18

Use a network security key:


If you have a wireless network, you should set up a network security key, which turns on encryption. With encryption, people can't connect to your network without the security key. Also, any information that's sent across your network is encrypted so that only computers that have the key to decrypt the information can read it. This can help avert attempts to access your network and files without your permission. Wi-Fi Protected Access (WPA or WPA2) is the recommended wireless network encryption method.

Change the default administrator name and password on your router or access point:
If you have a router or access point, you probably used a default name and password to set up the equipment. Most manufacturers use the same default name and password for all of their equipment, which someone could use to access your router or access point without your knowledge. To avoid that risk, change the default administrator user name and password for your router. Check the information that came with your device for instructions about how to change the name and password.

Change the default SSID:


Routers and access points use a wireless network name known as a service set identifier (SSID). Most manufacturers use the same SSID for all of their routers and access points. We recommend that you change the default SSID to keep your wireless network from overlapping with other wireless networks that might be using the default SSID. It makes it easier for you to identify which wireless network is yours, if there's more than one nearby, because the SSID is typically shown in the list of available networks. Check the information that came with your device for instructions about how to change the default SSID.

Position your router or access point carefully:


Wireless signals can transmit a few hundred feet, so the signal from your network could be broadcast outside of your home. You can help limit the area that your wireless signal reaches by positioning your router or access point close to the center of your home rather than near an outside wall or window.

19

Keeping Customers Up At Night


Which network security threats are top-of-mind for your customers these days? A recent survey of more than 3,700 IT professionals shows there are several of them. The Information Systems Audit and Control Association (ISACA), an international provider of industry information and certifications, has issued the results of a recent survey of the global security landscape, including perceptions of the most dangerous network security threats. In the past year, 22 percent of enterprises have experienced a security breach and 21 percent have faced mobile device security issues, according to survey. Here's a look at what respondents said are the most likely network security challenges they'll face over the next year, including how partners might be able to get in on the action.

1. Data Leakage:
Loss of data leads the league when it comes to IT security care-abouts, with 17 percent of survey respondents naming it as the most likely single threat facing network security in the next 12 months. And as various exploits target the seams of security coverage at the same time that the malware bugs are becoming more insidious, who can blame them? The data on the network represents a substantial percentage of company value, and various compliance standards such as HIPAA and PCI have stringent requirements that can make data loss an even more unpleasant experience than ever before. Thus, the topic is moving beyond its previous status as a technology level discussion, and it is becoming more of a business level discussion as C-Level executives of all types increasingly recognize the inherent risks.

2. Inadvertent Employee Mistakes:


Forget about the proverbial inside job. The second biggest concern, cited by 16 percent of respondents, is accidental exposures by employees, as opposed to the intentional, inside job variety. These could include acts such as parking data on insecure storage sites, malware accidentally delivered by USB devices, loss of computers, phones or USB devices, and also social engineering attacks in which victims are tricked into revealing sensitive information. The solution is based on more than just solid security technologies. It also involves no small measure of employee education on specific risks and how to avoid them. Look for channel partners to become more involved in this aspect of security as time goes on

3.Incidents Related To Employees' Personal Devices (BYOD):


Hey, I got this new tablet and Im going to use it on the network. Were not really sure how often these words are actually spoken, because a lot of times the devices simply show up without permission. But bring-your-own-device, also known as the Consumerization of IT has opened up a Wild West of new threat vectors. It's a fear that is quickly creeping up on
20

IT departments, as 13 percent of surveyed IT professionals said BYOD represented the most likely threat facing their network security over the next 12 months.The focus for the channel is mostly around detecting devices, maintaining security and figuring out exactly what those devices might be up to. This is an especially tall order when you consider the fact that personal devices are, well, personal. And, that means gaining access to them and managing them can be a lot more difficult, especially when employees are less than thrilled about the idea.

4. Cloud Computing:
Effective security for the cloud is a huge topic in todays IT discourse, which means it's not surprising that eleven percent of surveyed IT professionals said cloud computing represents the most likely threat facing their network security over the next 12 months. Nearly every vendor has a strategy for how cloud security can be maximized, and (surprise!) that vendors products happen to be the focal point of truth and justice. This means that the channel is looking at a huge opportunity in helping customers to navigate these offerings and the related purchasing decisions. But that level of assistanceimplies that the partners have a very strong knowledge of the various risks and responses. Some channel companies are doing a better job of that than others, according to many industry insiders. And since one of the key concerns about the cloud is that channel partners can become interchangeable parts, developing this expertise can be a key differentiator.

5. Cyber Attacks:
Cyber-attacks happen every day, although only the most high-profile ones tend to make the news. The most recent types of cyber-attacks are even purpose-built by national governments for a variety of purposes, such as espionage and sabotage. And some of the more famous ones, such as Stuxnet and Flame, are highly modular. That means some of the nastiest features can be lifted out of the military-grade bugs and dropped into existing malware platforms to make the more common types of attacks even nastier. That also means that as you read this, some malware author is probably using those modules to create an uber-bug that can put him on the map. Seven percent of surveyed IT professionals said cyber attacks represented the most likely threat facing their network security over the next 12 months.

6. Disgruntled Employees:
Weve all heard the stories about people who had installed attacks to occur when their name disappears from payroll, or some other attack on their employers in an illegal, or at least unethical, expression of Take this job and shove it. This is the domain of the disgruntled employee -- not to be confused with the accidental exposures committed by happy, gruntled employees otherwise in good standing. While such acts of malfeasance are relatively rare, it is important that channel partners identify potential symptoms and guide their clients toward policies that will help to prevent them before they occur. Five percent of surveyed IT professionals said disgruntled employees represented the most likely threat facing their network security over the next 12 months.
21

7. External Hacking:
Ah yes. Good old fashioned external hacking seems almost quaint given the rapid extension of modern threats and attack vectors. But given the emphasis on these recent developments, it can be easy to take your eye off the ball regarding garden-variety hackers. Five percent of surveyed IT professionals said external hacking is the most likely threat facing their network security over the next 12 months. For the most part, the strategy here is about keeping security suites properly configured and up-to-date. Not very exciting, we know. But its still something that requires your ongoing attention in the never-ending quest to keep your customers information safe.

22

CASE STUDY
Mumbai: Narsee Monjee Institute Entrance Test Racket Busted
Press Trust OF India| 02-May 22:08 PM Mumbai: Police claimed to have busted an MBA entrance test racket, with the arrest of six persons, including a B Tech graduate, at the Narsee Monjee Institute of Management Studies (NMIMS). The B Tech graduate, who is the prime accused in the case, has been identified as Alok Kumar, who cleared the NMIMS entrance test several times by impersonating real applicants. About 87 students cleared NMIMS Management Aptitutde Test (NMAT) for the MBA batch of 2013, police said, adding that about 22 students cleared the test and got admission in 2011. Five other accused, who acted as mediators, have been identified as Hanumant Singh Gujar, Sugriv Gujar who are both B Tech graduates and brothers, besides Bajendra Pratap Singh, MBA graduate Pavan Kumar and Himanshu Shekhar, the police said. The gang charged Rs 15 lakh per student, they said. The first five accused were held from Delhi, while Himanshu was nabbed from Pune in the last seven days. On behalf of the NMIMS, the NMAT test is conducted by Pearson VUE, the worlds largest education company that developes and delivers over 10 million computer-based test across 175 countries, police said. A month ago, the NMIMS complained us about possible fraudulent practices being carried during online tests for NMAT 2013. During the course of the investigation, we caught all the six accused who used to charge Rs 15 lakh per student to ensure that they clear the NMAT test, Joint Police Commissioner (Crime) Himanshu Roy said. Explaining the mouds operandi, Roy said the Gujar brothers, Singh and Pavan Kumar looked for prospective candidates who desired NMIMS admissions but had no capability to clear the online NMAT aptitude test on their own. The gang promised students passing marks in the NMAT exam through the management quota. For online exam, a student could approach any of the centres spread all over India. The accused filled up the admission form of students online, where photographs of applicants were not required, Roy said. The gang then prepared a driving license, aadhar card or pan card with the original details of students, but attached a photograph of Alok Kumar, who visited different examination centres and appeared for the aptitude test, he said. Over 20 people, including 7 who took NMAT on behalf of applicants, are wanted in the case, police said. The gang is suspected to have been involved in the admission racket for at least 3 years, while educational consultancy firms like Carrier Guidance in Uttar Pradesh and Meta Consultancy in Delhi have been found to be involved in such malpractices, they said. It was NMIMS which first noticed these possible fraudulent practices in the online NMAT test and took the matter to the Mumbai Police. The Crime Branch has done a commendable
23

job by exposing those involved in such practices and we will extend full help in their investigation, NMIMS University vise-Chancellor Rajan Saxena said.

24

Vous aimerez peut-être aussi