Professional Documents
Culture Documents
Introduction:
Network Security refers to the measures taken by any enterprise or organization to secure its
computer netwok and data using both hardware and software systems. This aims at securing the
confidentiality and accessibility of the data and network. Every company or organization that
handles a large amount of data has a degree of solutions against many cyber threats
Network Security is a set of technologies that protects the usability and integrity of a
company’s infrastructure by preventing the entry or proliferation within a network of a wide
variety of potential threats.
1.Access Control
Network security starts with access control. If bad actors gain access to a network, they can
surveil traffic and map infrastructure. Once they have mapped infrastructure and applications,
they can launch a DDoS attack or insert malware. Access control restricts the movement of bad
actors throughout the network.
2.Threat Control
Even with access control in place, problems can arise. For instance, a bad actor may
compromise an employee’s credentials to gain entry.Thus the need for threat control, which
operates on traffic that is already permitted. Threat control prevents the actions of bad actors
from doing damage within the network.
1.Firewall :A firewall establishes a barrier between the trusted and the untrusted areas of a
network. Thus, a firewall performs access control and macro-segmentation based on IP
subnets. The same firewall may also perform more granular segmentation, known as micro-
segmentation.
2.Load Balancer:A load balancer distributes load based on metrics. By implementing specific
mitigation techniques, a load balancer can go beyond traditional load balancing to provide the
capability to absorb certain attacks, such as a volumetric DDoS attack.
3.IDS/IPS:The classic IDS/IPS is deployed behind a firewall and provides protocol analysis
and signature matching on various parts of a data packet. Protocol analysis is a compliance
check against the publicly declared specification of the protocol. Signature matching prevents
known attacks such as an SQL injection.
4.Sandbox:A sandbox is similar to an IDS/IPS, except that it does not rely on signatures. A
sandbox can emulate an end-system environment and determine if a malware object is trying,
for example, to execute port scans.
5.NTA/NDR :NTA/NDR looks directly at traffic (or traffic records such as NetFlow) and uses
machine learning algorithms and statistical techniques to evaluate anomalies and determine if a
threat is present. First, NTA/NDR tries to determine a baseline. With a baseline in place, it
identifies anomalies such as traffic spikes or intermittent communication.
Objective & Scope
The main objective of network and security is to safeguarding information from unauthorized
access, data theft, and cyber-attacks. It involves implementing security measures and protocols
to protect computer networks, devices, and data from malicious activities.
5.Threats:To protect against threats such as malware, viruses, and other forms of malicious
attacks. Network security protects against cyber threats like malware, viruses, and other
malicious attacks that damage network infrastructure, compromise sensitive data, and disrupt
business operations. Implementing advanced security measures like intrusion detection and
prevention systems, firewalls, antivirus software, and secure protocols can help to prevent these
attacks and ensure the safety and security of the networks.
The scope of network security is vast and involves various aspects of protecting computer
networks and the data transmitted over them from unauthorized access, misuse, or damage.
Here are the key points that highlight the scope of network security:
1.Data Confidentiality: Ensuring that data transmitted over the network is accessible only to
authorized users and remains confidential from unauthorized users or eavesdroppers.
2.Authorization: Defining access rights and privileges for different users and devices,
ensuring that they can only access the resources and information appropriate for their roles.
7.Intrusion Detection and Prevention: Implementing systems that can detect and prevent
unauthorized access attempts or malicious activities within the network.
8.Mobile Device Security: Implementing security measures to protect mobile devices and the
data they access when connected to the network.
12.Network Segmentation: Dividing the network into separate segments or zones to contain
and isolate potential security breaches.
Chapterization:
Chapter 1 – Introduction To Network and Security
-Network Hardening
-Removing Unnecessary Services and Ports
-Patch Management and Software Updates
-Configuring Secure Password Policies
-Firewall Implementation and Configuration
Chapter 8: Conclusions