Professional Documents
Culture Documents
Security
• Definition of Network Security
It
or k
s, appl include
t w icat s
n t ne rk ions all net
r e (not /data u work d
d i ffe netwo til ev
on d just
“com izing a ices,
ai nly cols an
es m proto cations pute netw
cu s k
It fo networ appl
i What is rs ” ) ork
Network
It inc
Security? on e s
A’s , MP3
, P D e ts , e t c .
g
.
r
vulne ludes APP l u l a r ph led gad ompute
rabili LICA l ab rc
ties a e s ce w s e r en n d o t h e
lso th TION LAY l u d
Inc rs, bro
satell e E a rds a re.
ites a routes, swi R e
play networ hardwa k c
nd etc tches
. , Even
Network Security which protect data, It is not just also about hackers
hardware, software on a computer attacks
network.
How does Network Security works?
DETECTION
Without that a security breach may go
unnoticed for hours, days or even forever
E.g., auditing and logging, IDs, etc.
• The Types of Network
Security
Not every user should have access to your network. To keep
Access control out potential attackers, you need to recognize each user and
each device. Then you can enforce your security policies.
You can block noncompliant endpoint devices or give them
only limited access.
Data Loss Organizations must make sure that their staff does not
Prevention send sensitive information outside the network. Data
loss prevention, or DLP, technologies can stop people
from uploading, forwarding, or even printing critical
information in an unsafe manner.
Email Security Email gateways are the number one threat vector for a
security breach. Attackers use personal information
and social engineering tactics to build sophisticated
phishing campaigns to deceive recipients and send
them to sites serving up malware. A email security
application blocks incoming attacks and controls
outbound messages to prevent the loss of sensitive data.
Firewalls put up a barrier between your trusted internal and
Firewalls untrusted outside networks, such as the internet. They use a set of
defined rules to allow or block traffic. A firewalls can be hardware,
software, or both. Cisco offers unified threat management (UTM)
devices and threat focused next-generation firewalls
A web security solution will control your staff’s web use, block web-
Web Security based threats, and deny access to malicious websites. It will protect
your web gateways on site or in the cloud.
- Also refers to the steps you take to protect your own website.
-
Non- repudiation Protection against denial by one of the parties in a
communication
(sender/ reciever cannot deny sending /receiving data
Priorities – dictates which tools will be used, how they will be used, and which
assets need to be protected.
Strategy – definition of all the architecture and policy components that make up a
complete plan for security.