Network Security |
||||
Either dynamically (as the data is transmitted) or staticly (off-line) run data through an encryption system before transmitting it outside your own network, and, maybe, even before you commit it to your own cable.
Depending on your level of paranoia...
Any users accessing your network from outside should be first authenticated by some means other than account name and password and then all transmissions should be encrypted.
Anything that is in any way sensitive should not be sent in the clear. Either encrypt before transmission (static encryption) or during transmission (dynamic encryption). Both methods have pros and cons. Dynamic requires higher powered equipment to keep
up with transmission speeds but does ensure that there is only ever a small relationship between the plaintext and the cryptogram. Static encryption requires less power as it is done off-line but does mean that the plaintext and the cryptogram will be
adjacent in the system.A hacke finding them both would have a headstart in breaking the cypher and decoding similar messages.
Don’t forget the encryption and decryption keys... This can be inconvenient and creates a large task in managing the keys. It does have the benefit that any data stolen will still not be easily accessible to the hackers who stole it.
If your network is not totally contained within the physical perimeter that you control, any data traversing unprotected segments should be encrypted. It is simply too easy to connect to a cable and passivlely suck up all data that passes by.
If you cannot be sure that any part of the network is secure, then data shoulc be encrypted before being transmitted. This would be done (preferably) by hardware in the Network Interface Card (NIC). This requires that all Work Stations, File Servers,
Hosts and Routers, etc. have the same facility.
Web Author: Geoff May.
Last Update: 08/09/98 Copyright © 1998 by Network Business Services Pty Ltd. All Rights Reserved. |