How to improve network security?

what is a cyber-attack, Methods used in cyber-attacks, cyber attacks, how to improve network security,

how to improve network security

HOW TO IMPROVE NETWORK SECURITY?

With the increasing number of network security threats coming from the Internet, Network administrators need to keep one step ahead of cyber attackers. In this blog, we will discuss how to improve network security that helps you better protect your router and data network.

What is a Cyber Attack?

A cyber-attack is an attempt to gain access to your network from the internet to disrupt, disable, destroy, or gain control of your network infrastructure. The main aim of cybercriminals in most cases is to steal personal or financial information for financial gain.

Methods Used

There are many methods used by cybercriminals to gain access to or disrupt, your network and services. These include DoS and Denial of Service attacks, phishing attacks, ransomware, malware, MITM attacks, whale-phishing attacks, spear-phishing attacks, password attacks, SQL Injection attacks, and many others.

Cyber Attacks

As reported in news articles that there has been a cyber-attack on some organizations somewhere in the world. Recently even Microsoft's email servers were attacked. So there's a constant need to harden the security of your network. Cyber-attacks can come from different angles. One of them, Denial of Service attacks, can cause your server to become inaccessible from the internet. Spoofing attacks attempt to log into your router or even attempt to gain access through your VPN connections. So what can we do about it?

What we can do to improve network security?

Firewalls are the first line of defense to protect your network. They establish a barrier between secured and controlled internal networks that can be trusted, and un-trusted outside networks, such as the Internet. It's important to remember that firewalls cannot protect against viruses coming from infected media, such as an infected office document that a staff member might bring in on a USB flash drive. This will circumvent any security measures you have in place and requires the use of antivirus software installed on PCs to cut this risk.

1) Use the latest Firmware

Routers have several features that can protect against threats from the internet. Most of them are easy configuration changes that can help with network security, while others are built-in features that only need to be enabled. Ensure your router has the latest firmware version installed as it usually includes the latest security patches. For example, the most recent security fix in the latest firmware is to protect against Wi-Fi Frag attacks. This vulnerability can be used to steal user information or attack devices. So it is important to ensure your router always has the latest firmware version installed.

2) Use a restricted-access list when remote access enabled

If you need to access the router remotely to manage it, then it's recommended to restrict access to only known sources. You can do this by using the Access List function in the System Maintenance. This way only the IP addresses listed in the access list will be able to get access.

3) Use access-list with VPN tunnels

When accessing the router management page over a VPN connection, you can also restrict access by entering the peer IP address of the VPN connection. This will be the IP address of the PC at the other end of the tunnel. This way only authorized users will be able to access the router management page.

4) Use validation code - CAPTCHA

Another option you can use is to enable the Validation Code option which appears when you try to login into the router admin Web User Interface. Each time anyone then tries to log into the router, they will need to enter the temporary code that appears. This can protect the router from bot attacks where an automated bot or application continues to try a list of passwords found in a password list. Given enough time, any common password can be cracked, but if you need to enter a validation code with each attempt, then the job becomes much more difficult. While this still may not provide 100% protection, the idea is to make the job much harder. So that the hacker moves on to find an easier target.

5) Enable 2-factor authentication login

Two Factor Authentication provides strong protection against hacking. so it's a good idea to take advantage of it whenever it is available. You may have come across two-factor authentication before where you receive a validation code via a text message to your mobile phone number. That code then has to be entered, along with the correct username and password to gain access. Also, two-factor authentication can be used in remote dial-in VPN connections using the SmartVPN client.

6) Change management ports

Another thing is to change the management ports in the router. The default ports used are well known so changing the values to different numbers will make it more difficult for hackers to guess. But, a more secure way to manage your router remotely is to disable management from the Internet completely and use VPN to access the router management page.

7) Enable brute force protection

It is also recommended to Enable Brute Force Protection. These are when a hacker tries to log in to the router remotely, and they have no idea what the password is so they'll try every possible passphrase until eventually the correct login password is found. Enabling Brute Force Protection allows the Router to identify an IP address that has failed many login attempts, and block them for a set period.

8) Use firewall DoS defense

DoS (Denial of Service) is a networking attack that makes devices unavailable by flooding them with fake connection requests. These attacks are categorized into two types, flooding-type attacks, and vulnerability attacks. Flooding-type attacks will attempt to exhaust all your system's resources, while vulnerability attacks will try to paralyze a system by taking advantage of vulnerabilities of a protocol or operating system. The DoS Defense functionality in routers helps detect and mitigate a DoS attack.

9) Disable unused features such as unused VPNs

You should also disable any unneeded VPN services. This closes some doors for hackers. In later firmware versions, have disabled some of these services by default, so you will need to enable the required service if you need to use it.

10) Restrict access to the management console

Similarly, you should always disable unused services such as Telnet, SNMP, SSH, and so on. You can even limit access to the management console to certain LAN subnets. Syslog is a very powerful tool that will record a lot of events, and will sometimes show attempts to start a VPN tunnel or the IP address of a possible attacker.

11) Capture and check the Syslog regularly

A USB flash drive is adequate to collect the logs from the router. If collecting Syslog, it's a good idea to ensure that the correct time and date are configured in the router. So that the Syslog entries will have the correct timestamp. This helps to work out when an event occurred.

11 b) Sample of Syslog

It is good practice to check the router Syslog regularly to check if there have been attempts to gain access to your network.

Example of attempted login attack from internet
Here is an example of an attempted login attempt from the Internet. All those "maximum retries exceed" messages say a possible brute force attack, and will give you an idea of what to look for when checking the Syslog.

12) Use a secure password for admin login and all VPN profiles

Another good idea is to make passwords as long as possible. It is now more and more encouraged to use sentences or several common words stuck together to make it longer. According to some security experts, having a sentence as your password can create a nightmare for hackers. The advantage of using a sentence is that it's much easier to remember than a string of random characters, and it is also more secure when used properly. Using secure passwords, it is recommended to change them regularly. That way if someone has managed to guess one, they'll be cut off and have to start the process all over again. Do that often enough and they're not likely to keep trying.

13) Re-sign and change the default security certificates for SSL or HTTPS access

Routers allow administrators to create and sign a custom certificate for SSL, VPN, and HTTPS connections. Due to security concerns, it is recommended to have a unique private key on each device for self-signed SSL. A recommended practice in the event of an attack is to re-sign and change the default security certificates in case they were compromised.

Summary

In this blog, we looked at what cyber-attacks are and what are the steps you can take to protect your router and your network from these attacks. Like using the latest firmware, using validation code, capturing, and checking the Syslog. Disabling unused features, enabling two-factor authentication login, using firewall defense, using secure admin password, enabling brute force protection, etc. This included looking at what security features are available in routers.

COMMENTS

Name

Artificial Intelligence,16,AWS,2,Big Data,2,Blockchain Technology,3,Cloud computing,9,Computer networks,4,cybersecurity,3,Database,2,Digital Marketing,1,E-commerce,2,Internet of Things,12,Quantum Computing,1,RPA,3,Technology,5,Web Scraping,1,
ltr
item
PS TECHNO BLOG: How to improve network security?
How to improve network security?
what is a cyber-attack, Methods used in cyber-attacks, cyber attacks, how to improve network security,
https://blogger.googleusercontent.com/img/a/AVvXsEjV85Ir4xa7CZZtsp0Epg7zb1FaOhN9ySA3vI8nHuv3nR2ADG2CvPutgtBwiXHJNC8lUH5_UzEGWNyaHMjoGctouO119q1MqDqD9EYCGtbfGyzxN5Si41AJ7Pg68LhVMaRyqwpMr-HX2-LtcHvMX8CM6ZaK8sBUhcye2gn_eBgW2UglfIOJ5W5dlHxDsg=s320
https://blogger.googleusercontent.com/img/a/AVvXsEjV85Ir4xa7CZZtsp0Epg7zb1FaOhN9ySA3vI8nHuv3nR2ADG2CvPutgtBwiXHJNC8lUH5_UzEGWNyaHMjoGctouO119q1MqDqD9EYCGtbfGyzxN5Si41AJ7Pg68LhVMaRyqwpMr-HX2-LtcHvMX8CM6ZaK8sBUhcye2gn_eBgW2UglfIOJ5W5dlHxDsg=s72-c
PS TECHNO BLOG
https://pstechnoblog.blogspot.com/2021/10/how-to-improve-network-security.html
https://pstechnoblog.blogspot.com/
https://pstechnoblog.blogspot.com/
https://pstechnoblog.blogspot.com/2021/10/how-to-improve-network-security.html
true
8274238297581439573
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy