By Muthoga Kioni
Networks are the nervous systems of information technology. Networks are integrated computers and peripheries that are linked by cabling, telephony or wireless equipment.
The computers share resources and data. You have most likely heard of the Eastern Africa Submarine Cable System (EASSy), which will connect us to the global network. You will also have noted the numerous trenches being dug in major urban centres. This is the national fibre optic network being laid out. Data can be transmitted electronically within networks in the form of voice, video and images.
They are an indispensable part of our lives and the Internet is a good example. It is a network of networks that links millions of computers globally.
Companies have networks called intranets that are tailored to meet some requirements of an organisation. Controlling access to the intranet is a crucial security concern. First, it is concerned with what network resources an authenticated user can access based on his/her rank.
Access also involves all security policies assigned to a user and the behaviour of the user once he/she has accessed the network. Today, network security is about controlling user access to services and data and auditing their behaviour to ensure compliance with policies and regulations.
Security policies
Control is also largely based on what layers of security are applied to a network. Businesses must inspect the valuable and sensitive information to ensure confidentiality and integrity.
Security policies involve defining a manageable yet effective set of compliance-checking, enforcement and remediation. Companies should determine what types of checks will be performed, how often, what types of warnings will be displayed to users and how policies vary by user. Keep security policies simple.
Another component is giving users the option to access a limited set of resources (such as the Internet or email) so that they can work without interruption.
Finally companies should be prepared to handle exceptional user scenarios, which could occur at any time. For example if a natural disaster or an unusual problem prevented users from accessing the network. Provisions for access to critical resources from remote computers must have been outlined and appropriate privileges assigned.
—The writer (bmuthoga@hotmail.com) is an ICT Security and Forensic Specialist.