Network Security

Google Adsense
April 21, 2020
Data Mining
April 21, 2020
Show all

Network Security

Before we discuss Network Security, it is better to understand Cyber security and its domains.

Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber-attacks.

It aims to reduce the risk of cyber-attacks, and protect against the unauthorized exploitation of systems, networks and technologies.

Major Domains of Cyber Security

Application Security

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Much of this happens during the development phase, but it includes tools and methods to protect apps once they are deployed. This is becoming more important as hackers increasingly target applications with their attacks.

Information Security

Information security, sometimes abbreviated to InfoSec, is a set of practices intended to keep data secure from unauthorized access or alterations, both when it’s being stored and when it’s being transmitted from one machine or physical location to another. You might sometimes see it referred to as data security. As knowledge has become one of the 21st century’s most important assets, efforts to keep information secure have correspondingly become increasingly important.

Disaster Recovery

In the IT space, disaster recovery focuses on the IT systems that help support critical business functions. The term “business continuity” is often associated with disaster recovery, but the two terms aren’t completely interchangeable. Disaster recovery is a part of business continuity, which focuses more on keeping all aspects of a business running despite the disaster. Because IT systems these days are so critical to the success of the business, disaster recovery is a main pillar in the business continuity process.

Network Security

Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every organization, regardless of size, industry or infrastructure, requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today.

Today’s network architecture is complex and is faced with a threat environment that is always changing and attackers that are always trying to find and exploit vulnerabilities. These vulnerabilities can exist in a broad number of areas, including devices, data, applications, users and locations. For this reason, there are many network security management tools and applications in use today that address individual threats and exploits and also regulatory non-compliance. When just a few minutes of downtime can cause widespread disruption and massive damage to an organization’s bottom line and reputation, it is essential that these protection measures are in place.

Types of Network Security

Access Control

To keep out potential attackers, you should be able to block unauthorized users and devices from accessing your network. Users that are permitted network access should only be able to work with the set of resources for which they’ve been authorized.

Application Security

Application security includes the hardware, software, and processes that can be used to track and lock down application vulnerabilities that attackers can use to infiltrate your network.

Firewalls

A firewall is a device or service that acts as a gatekeeper, deciding what enters and exits the network. They use a set of defined rules to allow or block traffic. A firewall can be hardware, software, or both.

Virtual Private Networks(VPN)

A virtual private network encrypts the connection from an endpoint to a network, often over the Internet. This way it authenticates the communication between a device and a secure network, creating a secure, encrypted “tunnel” across the open internet.

Behavioral Analytics

You should know what normal network behavior looks like so that you can spot anomalies or network breaches as they happen. Behavioral analytics tools automatically identify activities that deviate from the norm.

Wireless Security

Wireless networks are not as secure as wired ones. Cyber-criminals are increasingly targeting mobile devices and apps. So, you need to control which devices can access your network.

Intrusion Prevention System

These systems scan network traffic to identify and block attacks, often by correlating network activity signatures with databases of known attack techniques.

3 Comments

  1. Mustafa says:

    Great sharing

  2. Data Mining says:

    […] Read More: Network Security […]

  3. Rehman says:

    Very helping material

Leave a Reply

Your email address will not be published. Required fields are marked *