A proxy server is a computer that offers network and internet access services to the client computers in a network. A client computer connects to the proxy server, and subsequently requests/ activates connection, services, files and other resources on the other servers. In some cases, the proxy may alter the client’s request and the server’s response for various reasons. By using the proxy server you can hide, conceal and make your network id anonymous by hiding your IP address. To get the anonymous status on the network or internet, strong intermediate methods are employed like cryptography etc. examples are e mailers, P2P systems,Hide my ass and Hide man etc.
There is a large number of the software available that allows you to hide your IP address with the help of the proxy servers. The well known software for this purpose is hide IP, Stealth surf, Netconceal, Anonymous surfing, Proxify and Ghost surf.
READ THIS:What are Communication Systems
The class A of the IP address constitutes almost 50% of all the IP addresses. This class is meant for large networks like the big multinational companies. Class B networks are medium sized like used in the colleges, Universities and other educational and training institutes.
The Regional Internet Registry (RIP) provides the IP addresses based on the geographical distribution. RIP also offers protection against the hackers that try to access the confidential data. All the personal information recorded by the ISP is kept in confidentiality.
Recommended post: What Are The Ten Commandments Governing Computer Ethics
==>>Reasons for Security Issues in Networks
There are multiple reasons for any network to get victimized by viruses, malware, worms and other security threats. Most common reasons for such security attacks in small sized companies are not using proper, licensed versions of Anti virus software. And of course using risky sites also download dangerous malware when network is not properly secured, which infects the entire network.
When any network uses non genuine, non licensed or cracked versions of anti virus and similar software, they do not update the latest virus signature file to protect the system till date. When new viruses are launched, this software doesn’t have latest viruses threats defined in their signature files, hence it exposes the entire network to these virus threats, and more often or a not network does get infected. As much as NA knowledge is important I couldn’t emphasize more on end user awareness as well.
There is another major type of attack which most of the companies ignore and eventually pay for it. These attacks are commonly known to be inside attacks. Ex employ of the company can be serious threat to the company networks, especially if ex employ had network related job, since all the critical information related network can be known in such cases, they can easily connect to the networks by making remote connecting using VPN, or through other sources, they can transfer viruses, malicious software which can leak secret and important information for organization point of view.
It is responsibility of NA to keep closer look to all the employees of the network, they should be award about their activities being logged and looked upon. There would be fewer chances of any inside security attacks if users are under an impression of being watched closely.
Recommended Steps for Network Safety:
There are six recommended steps which are of great importance keeping security of network in mind. If these steps are properly followed by NA, there are greater chances to avoid security threats of computer networks at the first place.
a) Larger computer should be divided in segments for management of the network and ease in finding culprit systems. Internet access should be filtered by blocking port1433 and port 1434 or one can use different firewall software to implement such type of filters. All unwanted or not required ports should keep blocked for any chance of being misused; only required communication ports should be open to data transfer. Internet access to SQL systems should be allowed form outside.
b) Keep closer look on open ports, port 80 is the most commonly used port for http access.
c) Network administrator should make sure to keep all the systems including server updted operating system files and latest patches. These critical updates and patches keep the system secure from vulnerabilities. NA make sure to keep clients automatic update option enabled in windows platform, so that when ever updates are released clients machines download and installed them and secure them to the maximum level, same should be done for server operating system but keep closer look in update server OS. Third party security tools are also available and can be installed after testing for meeting better security measures. IT managers can also use powerful authentication methodologies to keep the network secure from security threats.
d) Some times having limited Network administration can help in keep network secure as the lesser the people managing the network lesser the chances for security malfunctioning, it is also important to not give any local client computer admin rights, if any application which require admin rights for installation, only NA should installed it, providing admin information to any one else for assistance can be very risky.
e) Older known threats can attack again, it should be in mind of NA to keep computer network secure from latest ones should also be secured from previously know attacks. Windows known services Talnet, Clipbook should not be disabled, they have certain task to perform, do not disable any default service until you are sure and you know what you are doing.
f) Create, configure and implement security policies, implementing security policies can be useful in keep network secure. Keep network users educated on these policies and make sure to send out notice to all clients if any updates are made in these policies.
==>>Recommended post:What Are The Safety Measures When Using Computers