ARRRGH! No, this is not me living my fantasy as a swashbuckler, though as a fencing instructor (a healthy and fun diversion of mine), it would not be too far from reality. Rather, it is an expression of angst when I hear Enterprise Resource Planning (ERP) systems reduced to being called “accounting” or “financial” systems. I let the rather defamatory term slide when it comes from the chief financial officer or vice president of finance at a client of mine: hey, I am pretty picky about most things but even I have my limitations. But I cringe when I hear it from the reseller, because I know that this is a reseller with a myopic focus.
Simply put, the bad guys are constantly searching for any possible point of entry that can be exploited by viruses and malware.
The first three installments of the Cyberthreat Defense Report (CDR) began the process of looking beyond major breaches and the never-ending evolution of cyberthreats to better understand what IT security teams are doing to defend against them.
In this 2017 security survey, the overall responses strongly suggest that executive boards of enterprises and small to medium-size businesses (SMBs) are confident of their cyberthreat preparedness, low vulnerability, and data protection. The data reflects that their CIOs, heads of IT, and even their CISOs are all equally clear: we are secure.
Networking refers to the range of hardware, software, processes, regulations, and protocols that make up computer and other networks. A network is a telecommunications system that allows connected devices to exchange data via cables or wirelessly (Wi-Fi). Networks provide shared access to systems, services, applications, and devices such as the World Wide Web, servers, printers, storage devices, email, messaging, and many more.
Security on networks is controlled by a network administrator through a set of provisions and policies that prevent unauthorized access to the network and network-accessible resources. Access to secured networks requires authentication usually via username and password (one-factor authentication), but can be augmented to include additional steps based on something a user 'has' such as generating a code via a security token, card, or mobile phone (two-factor authentication), and further augmented to include something a user 'is' such as a retinal or fingerprint scan. Firewalls enforce access policies on the network and anti-virus software or intrusion prevention systems (IPS) help to detect and inhibit malware and other potential threats.
Networks can be connected by electrical cable, radio waves, and optical fiber which are defined as layers 1 (physical layer) and 2 (data link layer) in the OSI model. Types of wired technologies include twisted pair wire, coaxial cable, ITU-T G.hn, and optical fiber. Wireless technologies include terrestrial microwave, satellite, cellular and PCS, radio and spread spectrum, and infrared. The basic hardware components of a network include network interface controllers (NIC), repeaters and hubs, network bridges, network switches, routers, and firewalls.
Ethernet is the most widely-adopted and used family of communications media used in local area networks (LAN), encompassing both wired and wireless network communications. IEEE 802 defines the standards and protocols that enable networked device communications. Networks can be classified by physical capacity or purpose such as personal area networks (PAN), local area network (LAN), storage area network (SAN), wide area network (WAN), virtual private network (VPN), and others.