What is Network Security?
It’s a layer designed to protect the usability and integrity of our Network and Data. This includes both type of technologies Hardware and Software as well. Effective network security manages access to the network. It targets a variety of threats and stops them from entering into the network and further growth of the same into the network. First step into this is Authentication, commonly Username and Password.
- As this requires only authentication of Username and Password, sometimes termed as One Factor authentication. With two-factor authentication, something the user ‘has’ is also used (e.g., a security token or ‘dongle’, an ATM card, or a mobile phone); and with three-factor authentication, something the user ‘is’ is also used (e.g., a fingerprint or retinal scan).
- Once authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users.
- Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware.
How Network Security Works?
Network Security implements multiple layers of defenses at the edge in the network by implementing policies and controls. This help us to have access to authorized users only and malicious actors are blocked from carrying out exploits and threats. This help us to protect proprietary information from attack.
“ULITMATELY IT PORTECTS REPUTATION.”
Here, it is important to understand the Types of Network Security also. This will help us to understand in order to be able to provide secure network for us. What all in implemented?
Types of Network Security
Network Security Fundamentals
In order to be able to protect our network there are 5 basic network security fundamentals which have to be taken care every time are listed below : –
Network Security Vulnerabilities
If we look upon the top vulnerabilities, which identified during testing are always related to the Fundamentals defined above. Network most prominent vulnerabilities below:
If we see what all we have covered till now. It’s all about basics and in next chapter of this series we will look upon the SECURITY VOCAB.