International. The expectation created by hyper-connected smart buildings has made data security a paramount issue. In these buildings, each network connection is an open door for those who seek to breach the physical layer of their network.
To avoid these situations that put information at risk, each layer must be protected, as well as access points, from application-level encryption to authentication, virtual private networks (VPNs), firewalls and physical layer security, a critical part of proper planning.
"Security has traditionally been implemented in the higher logical layers of the network, however, as commercial building networks evolve and there are more connections, the physical layer becomes a more attractive target for hackers," said Sebastian Mediavilla, Field Application Engineer at CommScope. "Despite everything, there are several ways to protect it. One of the best ways is through active monitoring and automated detection."
Automated physical layer monitoring
Until several years ago you could install a firewall that protected the perimeter and ready, however, that has become obsolete. Today the business network is so complex and important that it must be constantly monitored to effectively protect it against constant possible attacks. One of the best ways to achieve this at the physical layer is through an automated infrastructure management system (AIM) that uses intelligent cabling, connectors, and connection panels to automatically manage and monitor the network in real time.
This way, if the AIM system detects an unauthorized device trying to access sensitive information or sensitive data, staff can be automatically alerted.
Protecting wireless connectivity
Wireless connectivity has brought new vulnerabilities that hackers have been trying to exploit. What once seemed certain, today can no longer be considered that way:
"An example of this is the WPA2 security protocol, used by WI-Fi systems; although it was secure at a certain time, hackers were able to penetrate these encrypted connections using a small weakness in the exchange of signals between clients and access points. But for a cellular network it is the service providers who manage security centrally, which makes security measures necessarily stronger and more effective," added Sebastián Mediavilla.
Another issue to consider is that, in public spaces, cellular networks have key security advantages compared to public WI-Fi networks; although it is possible to hack a 4G data transmission, it is much more difficult than accessing the public Wi-Fi network. Although in the networks of private companies the possibility of hacking a network is reduced, cellular networks are still much more secure, because their protection depends on providers and not on the administrators of the local network, who usually have fewer resources at their disposal.
Implementation of appropriate cabling infrastructure
Implementing an energized network, with fiber cabling for data and copper for power, supporting PoE devices, can also help increase the security of critical systems. In an energized fiber system, all connected devices get their power from the switches through the PoE protocol, which are typically backed by UPS batteries and generators. This centralized power structure is substantially more resilient and safer, as in the event of a major power failure, the AIM system and all connected safety devices will continue to function.
"Whoever controls the infrastructure of a network, controls the data that flows through it. In sectors such as healthcare and finance, the problem of network security has created new regulations and compliance requirements regarding data storage. The bottom line is vigilance. As the enterprise network becomes more connected, protecting sensitive data becomes more challenging, making the physical layer a more attractive target," concluded Sebastian Mediavilla, Field Application Engineer at CommScope.
Leave your comment