Tech Topic Connection - Network Security

            

          Network security is fundamentally related to information technology in that security is what keeps your data safe. Without hardened network security, the time and effort you put into creating data using your expensive hardware and software could be wasted. Without properly securing your network with hardware and software, you can lose it all in a simple hack. Network security requires a multi-layered approach to protect your network using hardware and software at many levels.

 


          When computers were created, there was no network to worry about having to secure. Massive original computers were only available to select employees who had physical access to the computers. When network protocols were first invented, they were designed to facilitate data transfer, such as TCP-IP, but not to provide security. As private computers became more popular and many people started connecting to the internet, hackers discovered how easy it was to get into unsecured systems. It started to become necessary to develop methods of securing data. Initially, passwords to a computer would provide access security, but the databases behind the scenes may not have been secure.

            Hardware components have been developed and integrated into networking components and individual computers. Networking hardware can include firewalls that can stop external malicious attacks. Specialized chips have been developed to protect computers at various points. A hardware security module is often included on newer computers. This module is sometimes called a Trusted Platform Module on PCs or Secure Enclave on Macs. According to (Sapkota, 2022),  the hardware security module “is a physical computing device that protects digital key management and key exchange, and performs encryption operations for digital signatures, authentication and other cryptographic functions”. Some chips are designed to lock down the BIOS, ensuring that malware cannot update it. There are also biometric devices that rely on voice, face, or fingerprint authentication, that replace passwords. Biometric authentication ensures that even if someone has physical access to a device, they cannot access data without authenticating. Biometric authentication eliminates the need for the weakest security link, which can be a password on a sticky note.

            Understanding different programming languages will help you understand an attacker’s methods and enable you to respond to different types of attacks. According to (Azariah-Kribbs) “As a cyber professional it is important for you to recognize both the causes and symptoms of whatever threat you face. Consequently, while employers may not require that you know how to code, having coding knowledge can really give you an advantage on the job (2022, para. 1).” C and C++  will provide the knowledge to help guard against that tar lower-level computer operations. Python can help you to perform maintenance tasks and can also aid in penetration testing. Understanding JavaScript can help you to guard against cross-site scripting attacks. Many databases use some version of SQL. SQL injection attacks exploit vulnerabilities in SQL to steal or change data within the databases. Having a good knowledge of SQL will help to protect against these types of data losses.

           Major operating systems are now built to work hand in hand with the hardware security chips installed. During the boot sequence, the operating system can check to see if there have been changes in the bios or certain encryption keys that could render the system vulnerable or let the OS know something has been changed. The operating system is responsible for controlling security that allows access to the system, such as login authentication. Modern operating systems employ an access control technology called sandboxing. Sandboxing will only allow specific resources to an application that are required for it to run. It must be authorized when an application needs access to another application’s data. The primary goal of sandboxing is to contain any damage that an application may cause if it causes damage. Older applications that do not conform to the sandboxing requirements can be denied the ability to run their code. 

We completely rely upon databases to store information for many applications to run effectively. According to (IBM Cloud Education, 2021) “It’s also naturally at odds with database usability. The more accessible and usable the database, the more vulnerable it is to security threats; the more invulnerable the database is to threats, the more difficult it is to access and use.” Database security is, therefore, very complex.

           Network security will encompass a multi-layered approach requiring hardware and software to work together. Users of the network will need to be continuously trained to look out for and actively avoid human error and traps such as phishing. Network devices such as firewalls, routers, gateways, hubs, and switches should keep their firmware updated to ensure the security of incoming or outgoing communications. Network devices should be tested regularly to see if their security can be penetrated.

            Following proper techniques and frequent testing is the best way to keep your networks secure.

References:

Azariah-Kribbs, A. (2022, September 17). 5 Must-Have Programming Languages for Cybersecurity – StartaCyberCareer.comhttps://startacybercareer.com/5-must-have-programming-languages-for-cybersecurity/

 

IBM Cloud Education. (2021, September 2). Database Security. https://www.ibm.com/cloud/learn/database-security

Sapkota, K. (2022, March 3). What Is the Difference Between HSM, TPM, Secure Enclave, and Secure Element or Hardware Root of Trust. wolfSSL. Retrieved September 17, 2022, from https://www.wolfssl.com/difference-hsm-tpm-secure-enclave-secure-element-hardware-root-trust/