SlideShare a Scribd company logo
Network Security Services and Your Business
Network security services are increasingly being implemented by businesses, large and small,
in the face of the growing number and variety of Internet threats. Today, nearly all firms are
connected to the Internet at least to some extent, and thus are exposed to risks that simply did
not exist even a few years ago. However, many business owners or managers are ignorant both
of the full range of cyber-threats, and also of the various ways in which these threats could be
countered. This is particularly the case in the area of computer network security.
If your organisation's computer network is connected to the Internet, then it has a real need for
network security services to counter the huge expansion in computer viruses, Trojans, spyware,
inappropriate material and "phishing" emails that have burgeoned in recent years. Information
security is a critical area for any business that uses the Internet, and especially those that rely
on e-commerce. There are a few main areas of network security services to consider, as follows:
Firewall configuration review, to check that the rules currently followed by the firewall, and
the type of firewall used, are appropriate to the given situation.
Detailed audit of computers and devices (such as routers and firewalls), and their location on
the network. This includes a review of any DMZ (De-Militarised Zone) standing in front of
your organisation's core network.
Network vulnerability assessment, to check previously-addressed vulnerabilities to ensure that
they are still covered by effective countermeasures.
Penetration testing, to probe the defences actively for new vulnerabilities. This kind of test
should be approached with caution, since it has the potential to disrupt operational systems or
cause a temporary denial of service. The rules of engagement should be agreed in advance and
put in writing.
The above functions can either be provided by an in-house team (in the case of larger
organisations) or else can be outsourced to a specialist information security firm. In either case,
it is imperative that Unified security services are implemented at regular intervals, and especially
after any major changes to the network.
The gateway to your internal network is obviously the firewall. However, there is a great deal
more to network security services than just a firewall. Also involved are considerations such
as the following:
Network configuration: Does it have a DMZ? What Internet-facing computers and servers are
present?
Type and number of devices: The choice of whether to use a hub, a switch or a router will have
security implications, as will the question of what type of cabling has been installed.
Protocols and ports supported: If the network supports services and open ports that are not
actually required by your organisation, then they should be disabled for security reasons.

More Related Content

Viewers also liked

Eine erste Bewertung makroprudenzieller Instrumente in der Immobilienfinanzie...
Eine erste Bewertung makroprudenzieller Instrumente in der Immobilienfinanzie...Eine erste Bewertung makroprudenzieller Instrumente in der Immobilienfinanzie...
Eine erste Bewertung makroprudenzieller Instrumente in der Immobilienfinanzie...
I W
 
Next Era Selling: 5 Strategies to Make Your Business Unstoppable
Next Era Selling: 5 Strategies to Make Your Business UnstoppableNext Era Selling: 5 Strategies to Make Your Business Unstoppable
Next Era Selling: 5 Strategies to Make Your Business Unstoppable
Anneke Seley
 
DISSERTATION MERGERS AND ACQUISITIONS IN BANKING AND FINANCE
DISSERTATION MERGERS AND ACQUISITIONS IN BANKING AND FINANCEDISSERTATION MERGERS AND ACQUISITIONS IN BANKING AND FINANCE
DISSERTATION MERGERS AND ACQUISITIONS IN BANKING AND FINANCE
Antonios Tseos, Bsc, Msc.
 

Viewers also liked (9)

Adapting to a Hybrid World [Webinar on Demand]
Adapting to a Hybrid World [Webinar on Demand]Adapting to a Hybrid World [Webinar on Demand]
Adapting to a Hybrid World [Webinar on Demand]
 
Eine erste Bewertung makroprudenzieller Instrumente in der Immobilienfinanzie...
Eine erste Bewertung makroprudenzieller Instrumente in der Immobilienfinanzie...Eine erste Bewertung makroprudenzieller Instrumente in der Immobilienfinanzie...
Eine erste Bewertung makroprudenzieller Instrumente in der Immobilienfinanzie...
 
Next Era Selling: 5 Strategies to Make Your Business Unstoppable
Next Era Selling: 5 Strategies to Make Your Business UnstoppableNext Era Selling: 5 Strategies to Make Your Business Unstoppable
Next Era Selling: 5 Strategies to Make Your Business Unstoppable
 
Forandringsledelse, rationelle og humanistiske forandringsmodeller
Forandringsledelse, rationelle og humanistiske forandringsmodellerForandringsledelse, rationelle og humanistiske forandringsmodeller
Forandringsledelse, rationelle og humanistiske forandringsmodeller
 
What Ido
What IdoWhat Ido
What Ido
 
Forandringsledelse og kulturens betydning
Forandringsledelse og kulturens betydningForandringsledelse og kulturens betydning
Forandringsledelse og kulturens betydning
 
Den lærende organisation
Den lærende organisationDen lærende organisation
Den lærende organisation
 
DISSERTATION MERGERS AND ACQUISITIONS IN BANKING AND FINANCE
DISSERTATION MERGERS AND ACQUISITIONS IN BANKING AND FINANCEDISSERTATION MERGERS AND ACQUISITIONS IN BANKING AND FINANCE
DISSERTATION MERGERS AND ACQUISITIONS IN BANKING AND FINANCE
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 

Recently uploaded

Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Dubai Multi Commodity Centre
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 

Recently uploaded (20)

A Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob BadgettA Brief Introduction About Jacob Badgett
A Brief Introduction About Jacob Badgett
 
State of D2C in India: A Logistics Update
State of D2C in India: A Logistics UpdateState of D2C in India: A Logistics Update
State of D2C in India: A Logistics Update
 
What Does A 3-Band Wedding Band Mean?
What Does A 3-Band Wedding Band Mean?What Does A 3-Band Wedding Band Mean?
What Does A 3-Band Wedding Band Mean?
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptx
 
IPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best ServiceIPTV Subscription UK: Your Guide to Choosing the Best Service
IPTV Subscription UK: Your Guide to Choosing the Best Service
 
Event Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybridEvent Report - IBM Think 2024 - It is all about AI and hybrid
Event Report - IBM Think 2024 - It is all about AI and hybrid
 
Hyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings releaseHyundai capital 2024 1quarter Earnings release
Hyundai capital 2024 1quarter Earnings release
 
India’s Recommended Women Surgeons to Watch in 2024.pdf
India’s Recommended Women Surgeons to Watch in 2024.pdfIndia’s Recommended Women Surgeons to Watch in 2024.pdf
India’s Recommended Women Surgeons to Watch in 2024.pdf
 
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdfMatt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
Matt Conway - Attorney - A Knowledgeable Professional - Kentucky.pdf
 
Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)Special Purpose Vehicle (Purpose, Formation & examples)
Special Purpose Vehicle (Purpose, Formation & examples)
 
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot ReportFuture of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
Future of Trade 2024 - Decoupled and Reconfigured - Snapshot Report
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small Businesses
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deck
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
The Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdfThe Inspiring Personality To Watch In 2024.pdf
The Inspiring Personality To Watch In 2024.pdf
 
USA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdfUSA classified ads posting – best classified sites in usa.pdf
USA classified ads posting – best classified sites in usa.pdf
 
sales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumsales plan presentation by mckinsey alum
sales plan presentation by mckinsey alum
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 

Network Security Services and Your Business

  • 1. Network Security Services and Your Business Network security services are increasingly being implemented by businesses, large and small, in the face of the growing number and variety of Internet threats. Today, nearly all firms are connected to the Internet at least to some extent, and thus are exposed to risks that simply did not exist even a few years ago. However, many business owners or managers are ignorant both of the full range of cyber-threats, and also of the various ways in which these threats could be countered. This is particularly the case in the area of computer network security. If your organisation's computer network is connected to the Internet, then it has a real need for network security services to counter the huge expansion in computer viruses, Trojans, spyware, inappropriate material and "phishing" emails that have burgeoned in recent years. Information security is a critical area for any business that uses the Internet, and especially those that rely on e-commerce. There are a few main areas of network security services to consider, as follows: Firewall configuration review, to check that the rules currently followed by the firewall, and the type of firewall used, are appropriate to the given situation. Detailed audit of computers and devices (such as routers and firewalls), and their location on the network. This includes a review of any DMZ (De-Militarised Zone) standing in front of your organisation's core network. Network vulnerability assessment, to check previously-addressed vulnerabilities to ensure that they are still covered by effective countermeasures. Penetration testing, to probe the defences actively for new vulnerabilities. This kind of test should be approached with caution, since it has the potential to disrupt operational systems or cause a temporary denial of service. The rules of engagement should be agreed in advance and put in writing. The above functions can either be provided by an in-house team (in the case of larger organisations) or else can be outsourced to a specialist information security firm. In either case, it is imperative that Unified security services are implemented at regular intervals, and especially after any major changes to the network. The gateway to your internal network is obviously the firewall. However, there is a great deal more to network security services than just a firewall. Also involved are considerations such as the following: Network configuration: Does it have a DMZ? What Internet-facing computers and servers are present? Type and number of devices: The choice of whether to use a hub, a switch or a router will have security implications, as will the question of what type of cabling has been installed. Protocols and ports supported: If the network supports services and open ports that are not actually required by your organisation, then they should be disabled for security reasons.