Welcome to New Horizons!

With 300 centers in 70 countries, New Horizons is the world’s largest independent IT training company. Our innovative, award-winning learning methods have revolutionized the way students learn, retain and apply new knowledge; and we offer the largest Guaranteed-to-Run course schedule in the world.

Our real-time, cloud-based lab solution allows students to access their labs anytime and anywhere. And we offer an extensive selection of vendor-authorized training and certifications for Microsoft, Cisco, CompTIA and VMware, ensuring that students are able to train on the latest products and technologies. Over our 30-year history, New Horizons has trained over 30 million people worldwide.

Here's a Quick Tip Regarding Network Security Levels

We often hear that network security is a multi-layered or multi-level concept, but exactly what are the specific layers? Moving from the most abstract to the most specific, we define the major levels of network security as:
  • Policy level.
    This is all about planning, strategy, and decision-making. At this level, you define the organization’s security needs and make rules designed to meet those needs.
  • Physical level.
    This pertains to the physical security of your network’s components. It includes the obvious—physically controlling access to workstations, servers, and network devices such as firewalls, routers, and switches. It also includes preventing unauthorized persons from obtaining physical possession of or access to the network cable (or, in the case of wireless networking, airwaves). Finally, it involves protecting network information that’s in hard copy form, such as written password lists and network diagrams, as well as smart cards, tokens, keys to removable hard disks, backup tapes, CDs, and anything else that pertains to your network.
  • Perimeter level.
    This involves stopping unauthorized persons or data from entering your local network from across the internet, through the phone lines, or other outside locations. The most obvious manifestation of perimeter security is the firewall, but it also includes network access controls in the form of logon authentication, intrusion detection systems, network-based anti-virus systems, network-based spam filtering, remote access quarantine controls and similar methods of keeping undesirable packets out of the network.
  • Host level.
    This includes security mechanisms designed to protect individual systems, such as host-based firewalls like the Windows firewall, host-based IDS and anti-virus programs, client-side spam filtering programs, operating system hardening and security patches, and securing individual applications.
  • Data level.
    This pertains to security of the data stored on your computer or sent across the network, and includes encryption technologies such as NTFS file level encryption, third-party disk/partition encryption, and IPsec encryption to protect data in transit. It also includes folder and file level access controls such as Windows share and file permissions.
By implementing security at multiple levels (preferably at all of the levels listed), you avoid the dangers of a single point of failure when it comes to protecting your network. Print this post

0 comments: