The issue of security of computer networks is now the most urgent and important for today's corporate environment. Corporate infrastructure should have a clear security policy, which developed after a risk analysis, identifying critical resources and possible threats of greatest danger. Such threats that we consider in our article:
Masquerade.
When a user impersonating someone else, there is the likelihood of unauthorized access to critical systems. To reduce the likelihood «domino» use the mechanisms of identification and authentication, then decrease the likelihood that a user with whom you are installing communications, is not a front person.
Theft of information in transmission.
The data could be stolen during transmission over unsecured channels. Important information should be cipher - it will reduce the likelihood of theft of confidential information.
Data Manipulation.
Perhaps the data, which are either stored on any media or transferred. Again, can help encrypt data, there are some methods of encryption technology to protect the integrity of the data, which prevents the modification of confidential information.
DoS attacks.
Denial of Service (DoS) a species of hacker attacks, which resulted in important systems are unavailable. This attack is carried out through an overflow of unnecessary traffic, resulting in overload occurs memory and processor. Many systems now have a means of recognition and protection from DoS attacks.
The main elements of security policy are the identification, an active checking and integrity. Identification of the threat of depersonalization and prevents unauthorized access to resources and data. Integrity protects against theft of data transmission and maintains the continuity of the transmitted or stored information. Active checks to monitor the proper implementation of security policy and helps protect against hacker attacks and intrusions into the network.