What happens if you neglect security in the network?What is the countermeasure?

What happens if you neglect security in the network?What is the countermeasure?

The importance of growing network security

Cyber security measures generally tend to emphasize end -point security measures.Certainly, protecting the device properly and protecting from the threat of cyber attacks is the basis of security measures.However, in the era of digital, it is necessary to take more broad and multilateral measures, not limited to endpoints.

Companies have been assumed to be connected to the Internet in various tasks, due to the impact of crowd shifts.Based on such situations, the importance of network security that protects the network is higher.

The basis of network security is to protect the entrance and gateway of the network using solutions such as IDS (unauthorized intrusion detection system)/ IPS (unauthorized intrusion prevention system), firewall, and UTM.First of all, intensively protecting the network boundaries between inside and outside the company to prevent intrusion into the company.

To network security assuming zero trade

Recently, due to the spread of mobile devices in business use and the penetration of new ways of working, such as teleworking, the target of network protection has not been limited to the company.Even when connecting from outside a company, it is common to go through a virtual network such as VPN.In addition, the spread of cloud services has increased the number of business applications using the cloud.The area to cover network security compared to before is widely expanded.

In response to these changes in the environment, the concept of zero -trast is being recognized.Zero Trust is the idea that basically not trusting the safety of communication both inside and outside the company.Even employee devices try to enhance safety by checking the communication.Behind this is that the recent malware is remarkable, and the complete defense at the "boundary of the network", such as the abuse of zero -day vulnerability, is no longer realistic.Due to the increasing number of devices and outside companies in teleworks, it is impossible to say that employee devices are not infected with malware.

In addition, the use of IoT equipment has begun to progress from the viewpoint of work efficiency.Therefore, it is certain that the number of devices that companies should manage and monitor will continue to increase in the future.And it is hard to imagine that attacks aiming for such devices will continue to occur.

■ Risk to know when using IoT equipment in the office >> Click here for details

Security risk in the network

Legging the security of the network may cause the following security risks.

1) Unauthorized access

Normed areas that should not be accessed from outside.For example, attackers and bots are accessing in -house storage.As a result of unauthorized access, there is a possibility that information leakage may occur.

ネットワークにおけるセキュリティを疎かにすると何が起こるのか? 対策方法は?

2) eavesdropping

Network traffic and data flowing on the communication route may be stolen.In addition to information leaks, there is also a damage such as spoofing.

3) Data falsification, stepping platform

The data stored on the server and personal computers in the network will be rewritten.In some cases, the encryption of business data by ransomware or the backdoor is installed and abused as a playe.

4) Malware infection

In some cases, it aims for malware infection.There is a possibility that one computer in the network is infected, and the infection may spread to other other PCs on the network.Furthermore, it is expected that infection will spread outside the network.

5) DDOS/DOS attack

If a server in the network is fraudulently invaded, there is a possibility that a DDOS attack program will be set up and the attack may be involved.Some secretly installed programs are cleverly hiding attacks.

Measures required for network security

Companies require the following measures as network security measures.

1) Appropriate protection of the gateway to the network

By using a firewall, IPS/IDS, UTM, etc., it is necessary to secure the entrance of the network connected to the Internet, that is, gateway.The firewall checks the transmission source of the traffic, that is, the IP address and port.On the other hand, IDS detects illegal access by checking the contents of the traffic, that is, the data packet.

■ What are gateway security and its importance?>>> Click here for details

2) Ensuring safety when connecting to an internal network from outside the company

For regular users, that is, being able to use the Internet at high speed while ensuring convenience, it leads to improved productivity.One of the means of "using the Internet at high speed while ensuring convenience" while maintaining safety is VPN connection.By virtually built a dedicated network and only allow users who have cleared the authentication to use, it is possible to connect to a safe and convenient network.

■ Is it improved by VPN connection?Network security at the time of remote work >> Click here for details

3) Ensuring safety when connecting to cloud services

In recent years, more and more companies are using cloud services.Therefore, it is necessary to ensure safety not only when accessing the internal network but also when accessing cloud services.The method of utilizing the VPN and cloud proxy introduced earlier is listed.Cloud Proxy is a service with a proxy server on the cloud, preventing users without eavesdropping or authority when accessing the cloud.

■ I can't listen anymore!?Review the security measures of the cloud >> Click here for details

4) Management of devices that premise external use

In order to properly manage the increase in mobile devices as the progress of digitalization, tools such as MDM (mobile device management) should be used.MDM is a solution that integrates system settings for business devices that are premised on carrying smartphones and laptops.As a result, it is possible to uniformly control and manage devices inside and outside the company's network.

■ What is the MDM that is even more necessary for remote work?>>> Click here for details

Network security is also required for small and medium -sized enterprises

The situation over cyber attacks is changing dramatically, as the damage caused by ransomware is expanding.Attackers on the Internet have combined various techniques and wisdom, aiming for attacks regardless of corporate size.The main examples are supply chain attacks, but steps and unauthorized access have occurred.

■ What is the danger of a supply chain attack that SMEs are not another affair?>>> Click here for details

In small and medium -sized enterprises, security software is being introduced as an end -point measure.However, considering the status of cyber attacks, which are becoming more sophisticated year by year and are expanding their attack targets, the expansion of measures has been waiting.In the unlikely event of a cyber attack, the effects may have a negative effect on business continuity.

After the corona, the use of mobile devices and teleworks are expected to penetrate further in the future.Based on the trends of such an era, the importance of taking security measures in a wider area, including networks, is increasing.

※本記事はキヤノンマーケティングジャパンのオウンドメディア「サイバーセキュリティ情報局」から提供を受けております。著作権は同社に帰属します。

Forefront of security

サイバー攻撃の最新動向とセキュリティ対策についてまとめたカテゴリです。

[PR] Provided by Canon Marketing Japan