You are on page 1of 2

Honeynet :

honeynet is a real network composed of a real networking devices and servers.that


is called honepots.this is intentionally made vulnerable,to invite the hackers so that
their hacking activities can be monitored, and their methods and pattern can be
studied. Or we can say that ,honeynet is a lightweight intrusion detection system.

DMZ:

It basically separates internal LAN from external untrusted network, External-

facing servers, resources and services are located in the DMZ. Therefore, they are

accessible from the internet, but the rest of the internal LAN remains unreachable.

This provides an additional layer of security to the LAN as it restricts a hacker's

ability to directly access internal servers and data through the internet.

an intranet is a private network which is heavily protected by many networking


devices.

PROXY SERVER
https://www.youtube.com/watch?v=f-oCTcf5k_0
A proxy server is a mediater between the external and internal networks,it
examines all incoming and outgoing traffic.
proxy servers has atleast 5 functions
1.}PROXY SERVER HIDES THE IP OF ITS CLIENT ,BY converting client ip into
diiferent ip. This function is called network address translation.(NAT),THIS NAT
function generaly performed by Router and Firewall
2.}
https://www.youtube.com/watch?v=ck3gx9HB9-k

Reconnoissance:

The word reconnaissance is borrowed from its military use, where it refers to a


mission into enemy territory to obtain information. In a computer security
context, reconnaissance is usually a preliminary step toward a further attack
seeking to exploit the target system. The attacker often uses port scanning,
for example, to discover any vulnerable ports.  After a port scan, an attacker
usually exploits known vulnerabilities of services associated with  open ports
that were detected.

Somewhat confusingly, active and passive reconnaissance are both


sometimes referred to as passive attacks because they are just seeking
information rather than actively exploiting the targets, as active attacks do.

Session layer is one of the most important layers in the OSI model because it
is responsible  for two important things in the computer networks i.e.
authorization and authentication. Let’s talk more about the basics of
the  session layer below

https://www.youtube.com/watch?v=33VYnE7Bzpk

You might also like