Ten defense strategies to address the challenges of Enterprise Intranet Security (1)

Source: Internet
Author: User

Almost all enterprises have paid more attention to network security. They have successively purchased firewalls and other devices to block security factors from the Internet. However, Intranet attacks and intrusions are still rampant. Facts have proved that the company's internal security factors are far more terrible than the external dangers.

Most enterprises pay attention to improving the border security of enterprise networks, but do not mention their investment in this area, but the core intranet of most enterprise networks is still very fragile. Enterprises have also implemented corresponding protection measures for internal networks, such as installing network firewalls and intrusion detection software that may easily reach tens of thousands or even hundreds of thousands. They also hope to implement security isolation between the Intranet and the Internet, however, this is not the case! In enterprises, users often access the Internet through Modem dialing, mobile phones, or wireless network cards without permission. These machines are usually placed in the intranet of enterprises, the existence of this situation poses a huge potential threat to the enterprise network. In a sense, the firewall that enterprises spend heavily on has lost its significance. This access method is very likely to cause hackers to intrude into the internal network without any knowledge of the firewall, resulting in leakage of sensitive data and virus spreading. Practice has proved that many technologies that successfully prevent enterprise network border security have no effect on protecting the enterprise intranet. As a result, network maintainers began to expand their efforts to enhance their internal network defense capabilities.

The following 10 strategies are provided to address the challenges of Enterprise Intranet security. These 10 policies are both internal network defense policies and a policy to improve the network security of large enterprises.

1. Pay attention to the differences between Intranet security and network boundary security

Intranet security threats are different from those of network boundaries. Network Boundary security technology prevents attacks from the Internet, mainly preventing attacks from public network servers such as HTTP or SMTP. Network Boundary prevention (such as the border Firewall System) reduces the chance that senior hackers only need to access the Internet and write programs to access the enterprise network. Intranet security threats mainly come from within the enterprise. A malicious hacker attack generally takes control of a Server inside the local area network, and then initiates a vicious attack on other hosts on the Internet. Therefore, hacker protection measures should be carried out at the boundary while establishing and strengthening Intranet protection policies.

2. Restrict VPN access

The access of Virtual Private Network (VPN) users poses a huge threat to the security of the Intranet. They place the weakened desktop operating systems outside the protection of the Enterprise Firewall. Obviously, VPN users can access the enterprise intranet. Therefore, avoid giving each VPN user full access to the Intranet. In this way, you can use the logon control permission list to limit the logon permission level of VPN users, that is, you only need to grant them the required access permission level, for example, you can access the email server or other selectable network resources.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.