As the technology is growing at faster rate, the potential threats to technology are also
growing faster than that. So, as to protect an organization from such network security threats severe
actions and several steps have to be taken by network security administrators. Large enterprises are the
most vulnerable to these threats, because these threats not only affects a single person but the
whole organization. These threats can be attack to any resource of an organization such as:
private network, computers and personal business data. The important aspect of any business
organization is to protect an organization from such threats that can make severe damages to the
organization by stealing confidential business data. Within the organization, all the computers and
devices are interconnected in a LAN network or using a WLAN (Wireless Local Area Network) and also
connected to Firewalls, servers and data servers. So, in order to provide security to an
organization several security measures has to be taken, so that security of an organization can not
compromise at any cost. There are several threats that can affect network security of an organization
such as: Wireless Sniffing, Denial of Service, sniffing of VoIP network, trojans and unauthorized access
to FTP server
The security measures has to be taken because there are several ways in which the
network of an organization can attacked and lead to a heavy loss of business data. Network
security administrators has to implement security policies such as to secure its internal as well as
external network from attackers because there are several ways in which an attacker can sniff the
network and resulting in heavy loss of data. The most common and severe threats that can affect
an organization such as: Wireless Sniffing, DoS (Denial of Service), sniffing of VoIP network,
Trojans and unauthorized access to FTP and Mail server.
Wireless Network Sniffing and potential measures to secure wireless Networks
Within more than 80% of the business organizations, business transaction and process are
taking placing over a wireless network within the organization and on WWW for business
processes globally. The business processes can be transferring of data from one zone to other or
sending mails over Internet using wireless networks and can be accessing of data servers and
FTP servers over internet using wireless networks. By sniffing a single wireless network, an intruder
can access all the incoming and outgoing traffic over that wireless network resulting in heavy loss of
confidential data to an organization. If any intruder able to crack firewall and he will be able to access
wireless network’s internal network and can read all the confidential data and also can inject malicious
packets in the network so as to route the packets to some other destinations. These critical business
processes contains sensitive data that is being transferred has to be secured from such attacks like
wireless sniffing and breaking of firewall system.
Sun | Mon | Tue | Wed | Thu | Fri | Sat |
---|---|---|---|---|---|---|
27 | 28 | 29 | 30 | 1 | 2 | 3 |
4 | 5 | 6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 | 16 | 17 |
18 | 19 | 20 | 21 | 22 | 23 | 24 |
25 | 26 | 27 | 28 | 29 | 30 | 31 |