«

»

Aug 26

Your Top 10 Security Steps to Protect Your Data, Part 3


3. Establish network security

Databases shared on an intranet or the Internet use the TCP/IP protocol. You may also use the TCP/ IP protocol when you share databases peer-to-peer, or with the database server. Though TCP/IP is good for moving data and allowing clients to connect to your data, it was NOT designed with security as a primary objective.
So unless you take precautions, it can allow uninvited access to your host computer, server software, databases, and perhaps to other client machines on your internal network.
TCP/IP doesn’t provide very much protection for data, so it is important to place barricades such as firewalls and SSL data encryption to stop access by uninvited visitors. We will talk more about how to use encryption or VPNs to protect data later in this series on database security.
• The most common barricade method used is the firewall, which separates your network into two distinct environments: a public environment that is “outside the firewall,” and a private environment that is “behind the firewall.”
Users outside of the firewall will only have access to those TCP/IP or hardware addresses that you expose. You can concentrate your security on those server machines that are exposed, while allowing the machines behind the firewall to operate with fewer safeguards.
• Using wireless networking devices can pose security challenges. These devices can broadcast your network traffic beyond the walls of your building, so it is extremely important to encrypt your wireless networking signals. Always use the maximum level of signal encryption available. We will discuss wireless networks in more detail later also.

Leave a Reply