MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Brief Overview of Network Security

A Brief Overview of Network Security

The reliance the modern business has on its IT cannot be understated. As a result, to keep their computing network and infrastructure running efficiently, companies need to have a network and cybersecurity policy in place. With the development and use of organizational computer networks with multiple endpoints, understanding the basics of network security is helpful when implementing and employing network security systems. Today, we take a look at the parts of your network, their functions, and what you need to do to protect them.

Network Hardware
Your business’ computing network consists of, at the very least, two connected machines set up to share resources. Most of the time, a business network consists of centralized computers called servers, and endpoints called workstations. Major networking components (working backward from the endpoint) include, network switches (that allow multiple workstations to be connected in packets); a router (that allows for wired or wireless connection to the network); and the modem (that connects the network to the Internet). On your network can be all types of other accessories (printers, scanners, copiers, and more).

Today, wireless networks have been deployed to provide additional mobility. In this case the router, which would have to have Wi-Fi capabilities, allows mobile endpoints (laptops, smartphones, tablets, and IoT devices) to connect to, and share the files on, an organization’s network. This promotes mobility by allowing the sharing and use of files without being physically connected to the network.

Network Protocol
The network protocol is a set of rules that work to control communications between devices connected to the same network. They make connections and set rules for data packaging for both sent and received messages. Popular protocols include:

  • Transmission Control Protocol and Internet Protocol (TCP/IP)
  • Address Resolution Protocol (ARP)
  • Domain Name System (DNS)
  • Secure Shell (SSH)
  • File Transfer Protocol (FTP)
  • Dynamic Host Configuration Protocol (DHCP)
  • Hypertext Transfer Protocol (HTTP)
  • Hypertext Transfer Protocol Secure (HTTPS)
  • Internet Group Management Protocol (IMAP4)
  • Post Office Protocol version 3 (POP3)
  • Simple Mail Transfer Protocol (SMTP)

There are many more, and every protocol is basically the building blocks of a deliberate interaction. Each protocol works to connect one part of a computer to another. Much like a bank has procedures in place to help keep your money safe, protocols are the procedures at work to keep your data safe.

Securing TCP/IP is especially important. TCP/IP communications are made up of four layers that work together. When a user wants to send information across networks, the information is passed through each layer, each adding data. Each layer features a header and a payload. The header contains layer-specific information, while the payload consists of the information that has come from the layer above it. To illustrate this a little better, we’ll describe the four layers in TCP/IP communications:

  • Application Layer: This layer sends and receives the information for particular applications, with protocols such as DNS, HTTP, HTTPS, and SMTP. Each application has to have its own specific protocol.
  • Transport Layer: This layer of connected (or connectionless) services are for transporting application layer services between networks and works to assure that connections are reliable. TCP and User Datagram Protocol are commonly used in the transport layer.
  • Internet Layer: This layer routes the data packets across networks. Internet Protocol (IP) is at the heart of this layer. IP specifically allows information streams to be broken up into segments known as data packets (known mostly as “packets”) and works to define and establish the Internet, as we use it, through addressing and routing.
  • Network Access Layer: Finally, the network access layer is in place to define the method of use within the scope of the local network link. It adds the protocols used to define the relationships used to transmit and receive data packets from the other layers.

With so many moving parts every time you send and receive information over the Internet (and within your own Intranet), you can see how difficult it is to keep the network free from threats. Now that you’ve got a small introduction to what each layer in your TCP/IP-run command does, we can now look at the vulnerabilities (and fixes).

The main security problem with any type of network is the dreaded “unauthorized user”. An attacker can connect through an unsecure hub/switch port. As a result, wireless networks traditionally are considered less secure than wired networks, as they can be accessed without a physical connection. Once in, a nefarious actor can steal valuable information, deny service to legitimate users, or spoof the physical identity of the network to steal more data. Here are a few TCP/IP vulnerabilities:

  1. ARP spoofing - Used to deliberately steal sensitive information, or to facilitate denial-of-service-attacks, session hijacking, man-in-the-middle attacks and more.
  2. Port scanning - Used to see what services are available to exploit.
  3. IP spoofing - Sending packets from what is seemingly a trusted address, while sending malware or stealing data.
  4. DNS spoofing - The Domain Name System associates domain names with IP addresses. So devices that connect to the Internet can have their DNS spoofed and reroute the info to a different IP address.

What to Do About It
Once the “bad” data has been sent to you there is very little you can do. That’s why we tell everyone that they need to be proactive about securing their IT. At MERIT Solutions, we can help you meticulously maintain your software, monitor your files, permissions, and access, and deploy today’s strongest network and cybersecurity strategies to keep threats from hampering your business. For more information, contact us today at (757) 420-5150.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Business Management Backup google Computer Managed IT Services Outsourced IT Microsoft Disaster Recovery Mobile Devices Business Continuity Business communications VoIP IT Support Windows 10 Email User Tips Cybersecurity Hardware Innovation Data Backup IT Services Efficiency Cybercrime Apps Tech Term Data Recovery Windows Managed IT Mobility Saving Money Mobile Device Management Server Ransomware Small Business Internet of Things Smartphone Operating System Data browser Productivity Law Enforcement Save Money Android Virtualization Office 365 BDR Telephone Systems Cloud Computing Smartphones Hosted Solution Quick Tips Phishing Passwords Money Data Security Information Technology Recovery Chrome Communication Microsoft Office VPN BYOD Automation Managed Service Provider Password Holiday Best Practice Social Media Risk Management Unsupported Software Collaboration IT Support Budget Social upgrade Data Management Network Work/Life Balance App Cost Management Wi-Fi Vulnerability Application Google Drive Hacking Facebook Avoiding Downtime Government Alert Data Breach Health Miscellaneous Computers Update Two-factor Authentication Gadgets Wireless The Internet of Things Social Engineering Data Protection Identity Theft Streaming Media Employer-Employee Relationship Artificial Intelligence Flexibility search Shortcut Tech Support Firewall Spam Wireless Technology Antivirus Current Events User Error Audit Managed IT Services Telephony Compliance Gmail Personal Information Politics Office tips Applications Private Cloud History Remote Computing Workplace Tips Cleaning USB Save Time Proactive IT Computer Care Phone System Television Fraud Legal Humor Users Disaster Encryption Apple Redundancy WiFi Commerce Big Data Sports Going Green Bandwidth Cortana Project Management Windows 10 Patch Management Education eWaste Router Hacker Vendor Management SaaS Internet Exlporer Solid State Drive Samsung Content Filtering Wireless Charging Excel Battery HaaS Data Storage iPhone OneNote Management Mobile Computing Transportation Blockchain Automobile Value Robot Mobile Security IT solutions Data Loss Devices Saving Time Marketing End of Support DDoS Google Docs Google Assistant Office Webinar Language Video Games Conferencing Exchange HBO altivista Mobile Touchpad Data Privacy Virtual Reality Distributed Denial of Service Microsoft Word Microsoft Excel Remote Monitoring Reputation Computer Forensics Scam IT solutions Music Gifts SBS Advertising compaq Professional Services Hard Drive File Sharing PowerPoint Employer Employee Relationship Edge Windows 10s Data storage Virus Analytics Wearable Technology IT Management hp Travel Nanotechnology Chromebook Keyboard Instant Messaging Worker Commute Storage Administration Wireless Internet Computer Accessories Chromecast Ciminal Mobile Device Hard Disk Drive Proactive Credit Cards domain WIndows Server 2008 Tablets Root Cause Analysis Smart Tech Managing Stress Colocation Gamification Websites Books Scalability FAQ remote Hard Drives Yahoo NFL Augmented Reality Connectivity Hiring/Firing Files Lithium-ion battery Lifestyle Business Intelligence Memory Touchscreen Administrator MSP Data Theft How To Running Cable Charger Server 2008 Outlook Ali Rowghani Word Content Filter Benefits intranet Trending Legislation Managed IT Service Relocation Students Access Unified Threat Management iOS Computing Windows Ink Monitoring IT budget Entertainment Comparison Unified Communications Training Regulation PDF Upgrades Computer Fan Analysis Electronic Medical Records Evernote server installation dvd "cannot install required files" stock Google Maps Maintenance Point of Sale HIPAA Specifications Screen Mirroring Financial Company Culture Sync Text Messaging Consultant Dark Web App store Safety Black Market Networking tweet Software as a Service Meetings Financial Technology Smart Technology Device Security Emails Identities Avoid Downtime Sales Cast calculator Adobe Shadow IT Workers Document Management Twitter Settings Printing IoT Experience Retail control Licensing WannaCry Laptop Identity Uninterrupted Power Supply Updates WSJ Spyware Monitors Worker CrashOverride Thank You Congratulations Emergency Cache

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...