Sunday, December 1, 2013

Communications and Security

Communications and Security are a challenge for most computer scientists, who are trying to build a secure and reliable system against attack from outsiders. There are too many technologies that applying for such different services in a communication system like VoIP, video conferences, chat, and email. The problem is how a security system can handle all of them and protect users at a time. As the way people connect together through computers has become more complex and more accessible, the security threat clearly has increased.

In this post, I would like to discuss the solution that can make our communication system more secure and reliable in connecting people-to-people.


1. Setting up properly a network firewall


One of the best solutions to against attack is to block all unrecognized traffic come in and out the network. The system should only allow traffic from trusted sources. Most of the firewall software has a blacklist of websites, and IP addresses that are being used to attack common users. Firewall will block all traffic from those ones in the list. It is important that users need to get the list updated because the malicious sites always increase by the time.





2. Deploy a Virtualized Private Network (VPN) for remote users 
Currently, most of the routers and firewalls support VPN. As the devices that support VPN are now very common and affordable, the system needs to get the VPN deployed properly for all remote users. This is one way to make the connected devices from any public Internet services can go through an encrypted tunnel to the system securely. As a result, VPN will keep all the traffic in-out the system safe.


3. Turn off all unused features and services in the system
One of the easy ways to protect the network is to turn off all unused features and services. It likes a house that has a lot of doors, and the owner cannot handle all guests come in and out if all the doors are open at once. If a feature or service is not being used, we should turn it off to reduce the potential attacks and improve network security. Another benefit from this is to improve the system performance, as the system will use fewer resources to operate all activities. Using each feature and service in intended purpose will keep the network securely.


4. Monitor all the call logs
For a communication system, monitoring all the call logs is very important to track down the attack and take action early. In network security, reading the system logs is only way to know what is going on in the system. Setting a baseline for a normal activity is also important. When pulling a call log report, the system can notice users if all recorded activities exceed the baseline. It will help to avoid the system getting compromised from outsiders.



References:
1. Tips for an Effective Unified Communications Security Strategy
http://www.smbnation.com/content/news/entry/guest-blog-7-tips-for-an-effective-unified-communications-security

2. Communication Security (COMSEC)
http://www.securestate.com/Federal/ESS/Pages/Communication-Security-COMSEC.aspx


3 comments:

  1. Hi Quang! I really enjoyed reading this blog post on communications and security. I liked how you focused on solutions of secured communications. You have a lot of information about different solutions to make communications more secure. I think all of the discussed solutions are very helpful. And of course, the basic solution to secure all communications is setting up a network firewall. I also found your references quite helpful. Overall, I think you did a great job with this blog post.

    ReplyDelete
  2. Quang, your post about Network Security is very sound. It explains well that the most popular network is a VPN. Your post has a lot of solid points about security and trafficking. Your blog does have a few grammatical errors, but it connects and makes it clear every point it makes. It is better turn off unused services to reduce power consumption, but it might not have any effect on system security. What would be useful is to devise a stronger trap to make it even harder for attackers to avoid being phished.

    ReplyDelete
  3. These are great solutions for securing private networks you have full control over. I like how you went into detail to fully explain all of the solutions you mentioned. The explanations are very clear and thorough. The resources to find more information are really helpful to find out more information about these strategies.

    ReplyDelete