Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Recommendations for protecting the physical layer of the network

International. The expectation created by hyper-connected smart buildings has made data security a paramount issue. In these buildings, each network connection is an open door for those who seek to breach the physical layer of their network.

To avoid these situations that put information at risk, each layer must be protected, as well as access points, from application-level encryption to authentication, virtual private networks (VPNs), firewalls and physical layer security, a critical part of proper planning.

"Security has traditionally been implemented in the higher logical layers of the network, however, as commercial building networks evolve and there are more connections, the physical layer becomes a more attractive target for hackers," said Sebastian Mediavilla, Field Application Engineer at CommScope. "Despite everything, there are several ways to protect it. One of the best ways is through active monitoring and automated detection."

Automated physical layer monitoring
Until several years ago you could install a firewall that protected the perimeter and ready, however, that has become obsolete. Today the business network is so complex and important that it must be constantly monitored to effectively protect it against constant possible attacks. One of the best ways to achieve this at the physical layer is through an automated infrastructure management system (AIM) that uses intelligent cabling, connectors, and connection panels to automatically manage and monitor the network in real time.

- Publicidad -

This way, if the AIM system detects an unauthorized device trying to access sensitive information or sensitive data, staff can be automatically alerted.

Protecting wireless connectivity
Wireless connectivity has brought new vulnerabilities that hackers have been trying to exploit. What once seemed certain, today can no longer be considered that way:

"An example of this is the WPA2 security protocol, used by WI-Fi systems; although it was secure at a certain time, hackers were able to penetrate these encrypted connections using a small weakness in the exchange of signals between clients and access points. But for a cellular network it is the service providers who manage security centrally, which makes security measures necessarily stronger and more effective," added Sebastián Mediavilla.

Another issue to consider is that, in public spaces, cellular networks have key security advantages compared to public WI-Fi networks; although it is possible to hack a 4G data transmission, it is much more difficult than accessing the public Wi-Fi network. Although in the networks of private companies the possibility of hacking a network is reduced, cellular networks are still much more secure, because their protection depends on providers and not on the administrators of the local network, who usually have fewer resources at their disposal.

Implementation of appropriate cabling infrastructure
Implementing an energized network, with fiber cabling for data and copper for power, supporting PoE devices, can also help increase the security of critical systems. In an energized fiber system, all connected devices get their power from the switches through the PoE protocol, which are typically backed by UPS batteries and generators. This centralized power structure is substantially more resilient and safer, as in the event of a major power failure, the AIM system and all connected safety devices will continue to function.

"Whoever controls the infrastructure of a network, controls the data that flows through it. In sectors such as healthcare and finance, the problem of network security has created new regulations and compliance requirements regarding data storage. The bottom line is vigilance. As the enterprise network becomes more connected, protecting sensitive data becomes more challenging, making the physical layer a more attractive target," concluded Sebastian Mediavilla, Field Application Engineer at CommScope.

Duván Chaverra Agudelo
Author: Duván Chaverra Agudelo
Jefe Editorial en Latin Press, Inc,.
Comunicador Social y Periodista con experiencia de más de 16 años en medios de comunicación. Apasionado por la tecnología y por esta industria. [email protected]

No thoughts on “Recommendations for protecting the physical layer of the network”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter