Risks+Associated+with+Networks

Risks are the potential consequences and impacts of unaddressed vulnerabilities. A vulnerability is a weak spot in your network that might be exploited by a security threat. In other words, failing to do Windows Updates on your Web server is vulnerability. Some of the risks associated with that vulnerability include loss of data, hours or days of site downtime and the staff time needed to rebuild a server after it’s been compromised. Such risks include:



> > == 2. Access Risks == > > == 3. Eavesdropping Risks == > > == 4. Hacking Risks ==
 * == 1. Policy Risks ==
 * One common wireless network security risk is caused by human error, not technical limitation. This risk is created when there are no policies in place governing network use. The employees of a company, for example, may not understand the risks associated with giving out access passwords or sharing data. If the users of a network do not follow smart policies, security holes can develop.The most common way to minimize this risk is through the establishment and enforcement of organization policies. For instance, a company might mandate that employees are not permitted to set up new wireless networks without authorization, and that all access keys are kept secret. Specific policies will vary depending on the needs of the organization, but should always make network security a top priority.
 * Related to problems with policy are the risks that come from improper access. All wireless networks broadcast a unique name for identification. Normally, this identification is used by authorized users to find and connect to the network. Unauthorized users, however, also have access to these identification names, and are able to detect any wireless network within range. Because of this, access to all networks should be guarded.The best access protection comes in the form of security keys. These keys, or passwords, allow only authorized users to access the network. Care should be taken to enable security keys on every network. Additionally, the identifying names of networks should be unique and random.As an example, a network named "OFFICE" should be changed to "23d-F3" or another obscure name. This helps prevent unauthorized users from guessing which network is associated with an organization. This name can also be changed periodically. A wireless network can also be "closed," in which case a user must enter the exact name of the network instead of selecting it from a list. All of these strategies hinder unauthorized access and help mitigate risk.
 * Wireless eavesdropping occurs when an unauthorized user collects data from the wireless signal. Because all interactions on a wireless network occur over the airwaves, some data can be collected even if an eavesdropper cannot log in to the network directly.For this reason, wireless networks should use the most advanced encryption available. Many wireless networks do not have this encryption enabled by default, or use outdated encryption methods that can be bypassed by skilled users. This encryption should always be enabled.Additionally, additional third-party protection programs can help limit eavesdropping risks. Software is available to transmit data using methods such as Secure Sockets Layer or Secure Shell, which add an additional layer of encryption. Firewall programs, including those built into operating systems such as Microsoft Windows, should also be used. These programs monitor incoming and outgoing data, and restrict the ability of eavesdroppers to access sensitive data.
 * Another serious wireless network risk is the vulnerability to hackers. Hackers might use network access to steal data or disrupt an organization, which can be very damaging. In addition to the previously mentioned security measures, intrusion detection software can be used. This software records all activity on a wireless network, and "flags" suspicious behavior. Network administrators can review the access logs in order to find the source of any hacking attempts.Anti-virus software should also be installed on both network servers and individual user computers. Such software can be effective in isolating viruses and other threats if a hacker is able to break through other security measures. To prevent worst-case data loss in the event of a hacking occurrence, backups of all important data should be made frequently. These backups allow an organization to quickly recover from an attack if it occurs.

__References:__
[]

[]

Chuong Nguyen