Basic security aspects of network security

Source: Internet
Author: User

While the news that companies are using wireless technology is encouraging, it also has security problems. As the amount of wireless area networks increases, the chances of hackers hacking into corporate networks are also increasing. The good news, however, is that when the wireless network industry grows, businesses are more concerned about cybersecurity issues than usual, at least in terms of basic security.

" Wired Equivalent encryption "(WEP) ability to defend their wireless networks has grown dramatically. RSA security Tim , regional vice president of international marketing. Picard (Tim Pickard) " protect its wireless network security from 2005 65% rose to 74%; 62% rose to 75%; from 2005 9%

But there's still a lot of room for improvement. In the three cities, nearly one-fourth of the companies have not taken any steps to protect their networks from malicious attacks. In addition to being able to steal confidential information, these companies are infected with the virus and Trojan horse program (Trojans)

Paris, London and New York near 1/4 " " two-factor authentication solution " and Dynamicode " RSA Security Two-factor authentication technology integrated into a authentication token " every 60 seconds can produce a new and unique password. The user simply needs to type in the individual user ID number (id or PIN)

The benefit of this " two-factor authentication solution " is that no matter how clever a hacker is, it is not possible to guess such a complex dynamic password in a short period of time. In addition,Dynamicode provides a one-stop solution that includes hardware, software, and implementation services, eliminating the overhead of building infrastructure, eliminating the need for additional human resources, hardware, or software, and reducing deployment time, deployment, and management costs. For the operator, it's pretty easy to use.

In addition to corporate wireless regional networks, public wireless Internet access points continue to rise ; It is worth noting that there are " public wireless internet sites" that are " disguised " to steal the user's information : A short-lived wireless network Bridge, The design looks like a real bridge to steal the user's confidential information.

Capgemini Management Consulting, Inc., providing security advisory services (Capgemini UK) of Phil . Cracknell (Phil Cracknell) said : " in wireless network security vulnerabilities," disguised " public wireless Internet access Point has formed the most serious and most likely interface, so that the attackers in almost a short period of time to intercept a batch of valuable information. "

Although wireless networks can lead to higher production value, enterprises must know how to take appropriate precautions to ensure the security of the network, in order to prevent outsiders invasion and destruction. It is best to use a high-level network security solution, or, at a minimum, to start the " Wired Equivalent Encryption " feature in wireless settings, which is at least a basic method compared to no security precautions.


Basic security aspects of network security

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.