TEAMWORK
TEAMWORK
Network security.
The network is an important area of exposure to risks.
In general, it defines the actual perimeter of security itself.
As a result, attackers often target the network as a starting
point for accessing other IT assets. Network security
consists of defending the network and related resources a
gainst threats. Network security employs physical and
software countermeasures to protect the network
infrastructure against unauthorized access, improper use, modification
and destruction.
The network is an important area of exposure to risks.
In general, it defines the actual perimeter of security itself.

point for accessing other IT assets. Network security
consists of defending the network and related resources a
gainst threats. Network security employs physical and
software countermeasures to protect the network
infrastructure against unauthorized access, improper use, modification
and destruction.
Tips for end users.
1.For any email received that contains a strange email address or the content is an advertisement or seems peculiar, do not respond and delete it immediately and inform the team of the same.
2.Avoid watching and downloading music movies series of pages on the internet avoid clicking advertising ads
3.Do not connect any non-external equipment that is needed to work in the company, not connect the mobile device to the Wi-Fi network or connect to the computer.
Technologies are used in cybersecurity to protect the data
1.Biometric technologies
Biometric technologies are a set of methods used to automatically recognize people by analyzing their physical characteristics (iris, fingerprint, palm of the hand, face, ...) or their behavior (voice, way of walking, writing, .. .).
2.Backup or backup
The traditional backup will fade, but the converged protection and copy management will increase. We have seen a general trend in the industry of how storage approaches applications. And in 2016, we will see that data protection will continue to make this change, since it will become a feature of primary storage systems, rather than a process that is managed by specialized administrators.
3.Hardware Security
Hardware security can be related to a device that is used to scan a system or control network traffic. Common examples include firewalls or hardware firewalls and proxy servers. Other less common examples include hardware security modules (HSM), which provide cryptographic keys for critical functions such as encryption, decryption and authentication for various systems.
4.Software Security
Software security is used to protect the software against malicious attacks from hackers and other risks, so that our software continues to function properly with these types of potential risks. This software security is necessary to provide integrity, authentication and availability. Among the types of computer security, this field of software security is relatively new.
Practices designed to protect the data
A. Design a small protection manual
The computer security company ESET advises SMEs to have a basic document - it does not have to be too long - that lists the IT protection needs of companies, the measures that can be taken and the sanctions that would be established in case of non-compliance
This text can be used to train personnel and avoid exposing the company to hazards.
B. Use a router with firewall
This company also points out that there are some routers or routers (that allow to connect to the network) more sophisticated, whose prices are "moderate" and that contain firewalls, which are protection devices that detect and block threats.
C.Contact with a technology advisor
Although everyone can be trained in technological issues, it is always advisable to have an expert in the field who can install the systems or programs that are required and that ensure the company's computer security.
D.Install an antivirus and update your equipment and systems
In all the computers used by your company, it is suggested to install an antivirus. There are several options in the market, which even offer free packages, with fewer functions than those paid, but which offer some protection.
Technical words
Malware: is a type of software that aims to infiltrate or damage a computer
or information system
Viruses: is a software that aims to alter the normal operation of any
type of computing device, without the permission or knowledge of the user, mainly
to achieve malicious purposes on the device
Worms: Computer worms spread from computer to computer, but unlike
of a virus, has the ability to spread without the help of a person. The most dangerous of
the worms or computer worms is their ability to replicate in the computer system,
so a computer could send hundreds or thousands of copies of itself, creating a
large-scale devastating effect.
Trojan: is a malware that is presented to the user as a seemingly legitimate program
harmless, but that, when executed, gives an attacker remote access to the infected computer
creating a backdoor that allows remote administration to an unauthorized user, does not cause
damage to the system but causes other damages such as information theft.
Spyware: is a malware that collects information from a computer and then transmits this
information to an external entity without the knowledge or consent of the owner of the
computer, it installs itself in the affected system so that it is executed every time it is put
the computer is running, affecting the stability and operation of the operating system.
Comentarios
Publicar un comentario