Network Security

​​Most of the information theft around the world is performed with in-house attacks rather than outside ones. A middle level experienced person can listen to the network packages by pulling the internal network traffic with the methods like overloading the table of switching devices in the network and showing himself/herself as a network gateway by creating ARP packages. Against these kinds of ARP spoofing, Mac flooding, Dhcp Snooping, smart keys must be used and their security configurations must be made.

Besides, out-house people must be prevented from entering into the network by first authenticating the people who will enter into the network and then let them in. Certificate based authentication (PEAP, EAP-TLS) methods must be used in these kinds of network based authentication solutions (802.1x). For security solutions, BBS put certificate based authentication and second layer security projects in corporate networks, including campus networks, into life.