As your business grows, so do your network and infrastructure requirements. Here at Power House Custom Computing, we have the knowledge and skills to help!
We evaluate your current network and see what needs to be done to make it faster and more secure.
There are 3 basic principles we use to determine Network Security:
Confidentiality can entail physically or logically restricting access to sensitive data, or encrypting traffic across a network. Usually, this requires the following:
- Utilize Network Security Mechanisms such as firewalls and access control lists to prevent unauthorized access to network resources – either sensitive or otherwise.
- Encrypt traffic so that an attacker can’t decipher any captured traffic from the network
- Require Credentials such as usernames and passphrases, as well as Two-Factor Authentication, to access things like Network Shares, or even VPN Access to the network from external locations.
Integrity ensures that Data going across a network has not been modified while going from point to point. A data integrity solution might perform origin authentication to verify that the information you receive really was sent from the server that you meant to receive it from.
Some Examples of Integrity Violation include:
- Modifying Financial Records in a Database
- Modifying the appearance of a website, such as your banking website or an internal Corporate Intranet site, to gain sensitive information like your username and password
- Intercepting e-commerce transactions
This is a measure of how accessible Data is. If a server were down only five minutes per year, it would have an availability of 99.999%. This is referred to as the “five nines of availability”.
A couple examples of how an attacker could compromise the availability of a network are:
- Sending improperly-formatted data to a network device, which can result in an unhandled exception error.
- They can also flood a target with an excessive amount of traffic, which will overload the system’s resources – preventing the system from responding to legitimate requests. This is called a denial-of-service (DoS) attack.