Abstract

This chapter discusses the network security basics. A good network security system will help to remove the temptations easily, and will be as transparent to the users as possible. File servers on which sensitive data is stored and infrastructure servers that provide mission critical services such as logon authentication and access control should be placed in a highly secure location. At the minimum, servers should be in a locked room where only those who need to work directly with the servers have access. Denial of Service (DOS) attacks are one of the most popular choices of Internet hackers who want to disrupt a network's operations. The objective of the DOS attacker is to bring down the network, denying service to its legitimate users. DOS attacks are easy to initiate; software is readily available from hacker Web sites and warez newsgroups that will allow anyone to launch a DOS attack with little or no technical expertise. The Domain Name System (DNS) DOS attack exploits the difference in size between a DNS query and a DNS response, in which all of the network's bandwidth is tied up by bogus DNS queries. The security plan should also address the procedures for reporting security breaches, both internally, and if the police or other outside agencies are to be brought in. It is suggested that password change policies should prevent users from making only slight changes.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call