Network Security Pdf 2020. There are numerous myths surrounding network security, and they often get in the way of effective solutions. In this article, I’ll debunk nine common misconceptions about network security.
While the goal of security is to prevent data breaches, many companies pursue the wrong strategy, which leaves them vulnerable.
You can’t prevent everything from happening. Thus, you need a mix of prevention and detection and response. But if you are doing both, then what are the myths that fool you?
Myth 1: If you have McAfee/Symantec/Sophos/Symantec/Panda on your network, you’re safe.
That’s just plain wrong because malware is not all that is going on in your network. Your IP is insecure and your wireless network has been compromised. The one who is monitoring your network traffic or the one who is on your payroll has been sniffing around your network with a packet analyzer like Wireshark and knows how to break in.
If they know where they want to go, they will go there — no matter what is on the firewall or on the endpoints.
Myth 2: You’re safe because of your firewall rules — I block everything except what I want.
Firewalls are like door locks — they only work if you use them properly. Most organizations do not set up their firewalls properly, which means that they can be bypassed easily by a skilled attacker. It’s like having an expensive lock on your front door but leaving it unlocked for anyone to walk in as long as he knows about it beforehand.
A good security policy should be much more than just a checklist of what to block or allow through; it should also include other elements such as risk assessments and compliance requirements. A good security policy ensures that all risk areas are covered and that policies are applied consistently across the entire organization so that no one gets special treatment — even the CEO!
Myth 3: If I have a firewall, I don’t need an IDS/IPS.
Most organizations do not realize that the firewall is just one layer in the security onion. You need firewall rules, intrusion detection, and intrusion prevention to cover all possible risks.
4: I’m safe because my routers aren’t connected to the Internet.
5: Our IT department is in charge of security.
6: If I’m careful when using social networking sites and other public sites, I don’t need antivirus software.
7: We’re secure because we have antivirus software.
Myth 8: We’re secure because we have a firewall and antivirus software.
Network Security Pdf 2020 myths
The truth is that you must use more than one tool for security and not rely on any single tool to protect your network from attacks. Most people think that if they have antivirus software installed on all their endpoints, they are safe. But what if the malware gets through the antivirus? What if it breaks out of virtual machines? You need to be prepared for that eventuality, too.
Hackers know how to bypass all kinds of firewalls and antivirus programs, so you need to acknowledge this fact and have other layers of protection in place as well — such as intrusion detection and prevention systems (IDS/IPS) that monitor traffic between clients and servers for signs of intrusion attempts or attacks
Myth 9: I’m safe because we control all the hardware devices on the network.
When you think about it, it’s fairly easy for an attacker to get around this one. You can’t possibly control every hardware device on your network — there are too many of them!
In many cases, all an attacker needs to do is call up your operations department or storage vendor and ask for a copy of their documentation on how to configure various devices on your network; from there, it’s easy enough to figure out.