Two Way Street for Network Security

Facebooktwittergoogle_plusredditpinterestlinkedintumblr

Security on a network is a two way streetSecurity on a network is a two way street

Security on a network is a two way street. It does not matter if it is your personal or business network. There needs to be as much thought about things coming into the system and things going out of the system.

When was the last time you considered what was going out on your network. Things going out can compromise your network? You receive emails and then send them onto others. You access websites and interact with these websites. As well you might be one that does online gaming.

Even if there is a firewall in place. Once you access the internet you are vulnerable to what is roaming out there on the internet.

I remember reading an article. It stated that stated that religious and regular sites are more vulnerable. That is to have viruses and malware on them than paid XXX sites.

I remember a few years ago my brother-in-law came to me with a question. The question pertained to the fact that he wanted more control over certain computer. He wanted to be able to control the web sites on that computer. It had nothing to do with accessibility to unwanted sites. This had to do with the ability to prohibit access to websites at certain times during the day.

Top

How to Restrict Internet Access

Now there are two ways to prohibit access to websites through one’s network. One is through the home router. The other is through each individual computer on one’s network. Now this needs understanding through the technology. That is how devices able to access the internet. This could be a smartphone, iPad, tablet, laptop, or computer.

You are also limited the access times of day to the internet. The times of day will depend on who it is. You might have young children, school age children or even high school. There might also be college age young people in your home.

How much control that you what to have will depend on the above mentioned situations.

Top

Why You would Restrict Internet Access

Getting back to my brother-in-law. They had a daughter that was home schooling at home. When she would use the internet for school work it was too easy to access other sites. These sites included sites like Facebook, twitter and YouTube. What was happening was that she was getting lost in these sites and not completing her school work.

They did not want these sites band from everyone else their daughter. They needed her to access the internet for school purposes but not to waste time on.

Here is an example that one computer needed restricted accessibility in the home. The rest of the computers and Internet of Things (IoT) did not need this control.

Now I have had an issue in the past that is different. In our home we needed to prohibit all xRated sites so that our son would not access them. Thus we needed to band such sites from the whole network.

Top

How to Restrict Internet Access

Whether you need to restrict one computer or need to restrict a whole network you are able to do that. You are able to restrict one computer with the file called hosts. You can access this file in c:\Windows\System32\Drivers\etc\hosts. If you need to restrict a network you can do it through the parental controls of your router.

This information might seem very technical to you the reader. I have to agree. You do need to know some information on how to get around your computer. Also you need to know how to get around your router. Once you understand. Then this information and knowledge will help you control any computer and router. Then you should be fine.

Top

Steps to Restrict one Computer to The Internet

To restrict one computer you need to do the following steps:

  1. Press the Windows key.
  2. Type Notepad in the search field.
  3. In the search results, right-click Notepad and select Run as administrator.
  4. From Notepad, open the following file: c:\Windows\System32\Drivers\etc\hosts.
  5. Make the necessary changes to the file.
  6. Go to the bottom of the file.
  7. At the bottom you will find 127.0.0.1.
  8. Add the next line – 127.0.0.1 www.yoursite.com .
  9. Click File > Save to save your changes.

These steps will restrict this computer or any computer to accessing the website. All other computer and IoT will still be able to this website or any number of websites in the list in the hosts file.

Top

Steps to Restrict a Whole Network to The Internet

To restrict a whole network you need to do the following step:

  1. Open your favorite browser.
  2. Type in your router’s ip address.
  3. It is usually 192.168.0.1.
  4. Type in the username and password to access your router’s web interface.
  5. Access the parental controls.
  6. You can filter a device, a keyword, a day and or time of day.
  7. Save your changes in the router’s web interface.
  8. Log out of your router’s web interface.

The above steps will aid you in restricting your network for any reason. This includes restricts for any device with keywords and day and time for one or all devices on the network.

Top

Reason Why Security is Important

Now you can see that security is as important from the personal side as it is from the internet side. There are many web sites that will threaten your personal security.

These sites can mine your personal and business information without you knowing it. These sites can release malware and spyware to do this without you know that the mining is going on. Being aware of how much personal and business information you give out is important. When asked you need to know that there are websites out there that will do the same.

These websites are very well engineered. They will take you to another website without you know it. The website will look the same but are different.

You need to know about these websites. They are phishing websites. You need to be aware of how these websites work. They are subtle. Clicking on a link and then going to a similar website is all it takes. Many malicious websites will do the above mentioned action. So as a reader of this post you can now be aware of this situation.

Along with phishing now users of devices have to deal with ransomware viruses. If you do not already know from the name and news reports. Ransomware holds the computer or IoT device from ransom. There is always a dollar figure attached to the ransom. Because the thief that is able to ransom more thank one device at a time the ransom amount is or can be low.

Top

Security Breaches Have Already Happened

Many organizations and companies already have had this experience. Ransomware threats are real. They are happening more and more all the time. This is one more way that cyberspace thieves are able to access people’s funds. The locked device becomes inaccessible until the thief receives the ransomed amount. These devices can be anything from your computer to your car.

It is true that ransomware is different from phishing or any other type of malware or virus. Controlling your network activity will definitely lessen unwanted issues. This is true for any of the above scenarios. This is as important as controlling access to personal or business data information. How important your data is will determine if it will be a target of any theft by any thief. Protecting your data should be a priority at all times.

Closing Thoughts

It is so important to remember data security is the priority of the owner of the data. Therefore, stop, think, and then connect. It is through this process that the security of your data and information will be at the highest level. Do your part to control and protect your data and information at all times.

Top

14 thoughts on “Two Way Street for Network Security”

  1. A person essentially assist to make significantly posts I’d state. That is the first time I frequented your website page and so far? I surprised with the analysis you made to create this particular publish amazing. Magnificent task!

  2. Thanks for sharing your ideas. I’d also like to mention that video games have been at any time evolving. Modern tools and enhancements have assisted create sensible and fun games. These types of entertainment video games were not really sensible when the real concept was first of all being experimented with. Just like other forms of know-how, video games too have had to evolve through many decades. This itself is testimony towards fast growth and development of video games.

  3. I have really learned result-oriented things through your blog post. Yet another thing to I have seen is that in many instances, FSBO sellers will certainly reject you. Remember, they will prefer to never use your expert services. But if anyone maintain a stable, professional connection, offering aid and remaining in contact for about four to five weeks, you will usually manage to win a business interview. From there, a listing follows. Cheers

  4. Hey! I simply would like to give a huge thumbs up for the good information you have here on this post. I will likely be coming again to your weblog for extra soon.

  5. HiWhat’s upHi thereHello, this weekend is nicepleasantgoodfastidious fordesigned forin favor ofin support of me, becausesinceasfor the reason that this timeoccasionpoint in timemoment i am reading this greatenormousimpressivewonderfulfantastic informativeeducational articlepostpiece of writingparagraph here at my homehouseresidence.

  6. PrettyVery greatnice post. I simplyjust stumbled upon your blogweblog and wantedwished to mentionto say that I haveI’ve reallytruly enjoyedloved browsingsurfing around your blogweblog posts. In any caseAfter all I’llI will be subscribing for youron yourin yourto your feedrss feed and I am hopingI hopeI’m hoping you write againonce more soonvery soon!

  7. I enjoyI likeI loveI quite likeI really like readingreading throughlooking through a postan article that will makethat can make peoplemen and women think. Also, thanks forthank you formany thanks for allowingallowing forpermitting me to comment!

  8. F*ckin’ tremendous things here. I am very satisfied to peer your article. Thanks so much and i am taking a look ahead to contact you. Will you please drop me a mail?

Leave a Reply

Your email address will not be published. Required fields are marked *