Home >>Information Security Cyber Law Tutorial >Network Security

Network Security

Network Security

Network security is the security that is provided against unauthorised access and risks to a network. Network administrators have a responsibility to take preventive measures to protect their networks from possible threats to security.

Security is needed for computer networks that are involved in regular transactions and communication within the government , people, or business. By assigning it a unique name and a corresponding password, the most common and easiest way to protect a network resource is.

Types of Network Security Devices

Active Devices

The surplus traffic is blocked by these security devices. Examples of such devices include firewalls, antivirus scanning devices, and devices for content filtering.

Passive Devices

These devices, such as intrusion detection appliances, identify and report unwanted traffic.

Preventative Devices

Such devices search the networks and identify possible problems with security. For instance, devices for penetration testing and appliances for vulnerability evaluation.

Unified Threat Management (UTM)

These devices act as security devices that are all-in-one. Firewalls, content filtering, web caching, etc. are examples.

Firewalls

A firewall is a network security system that, based on certain protocols, manages and regulates network traffic. A firewall sets up a barrier between the internet and a trusted internal network.

Firewalls function both as software-running applications and as hardware. Hardware-based firewalls can provide other features for that network, such as acting as a DHCP server.

Many personal computers use firewalls based on software to protect data from internet threats. Firewall components are found in many routers that transfer data between networks and, conversely, many firewalls can perform simple routing functions.

Firewalls are widely used to prevent unauthorised internet access on private networks or intranets. In order to be checked for security measures, any message entering or leaving the intranet goes through the firewall.

Both hardware and software-based systems consist of an ideal firewall configuration. A firewall also helps with secure authentication certificates and logins to provide remote access to a private network.

Hardware and Software Firewalls

Firewalls for hardware are standalone products. These are also used in routers for broadband. A minimum of four network ports are supported by most hardware firewalls for linking other computers. Business networking firewall solutions are available for wider networks , for example, for business purposes.

On your computers, software firewalls are installed. Your computer is protected from internet threats by a software firewall.

Antivirus

An antivirus is a method that is used to detect malicious software and remove it. It was originally designed for viruses to be identified and extracted from computers.

Modern antivirus software not only defends against viruses, but also worms , Trojan horses, adware , spyware, keyloggers, etc. Some products also provide protection against malicious URLs, spam, attacks by phishing, botnets, attacks by DDoS, etc.

Content Filtering

Devices screen unpleasant and offensive emails or web pages for content filtering. These are used in corporations as well as on personal computers as part of firewalls. When anyone attempts to access some illegal web page or email, these devices generate the message 'Access Denied'.

For pornographic content and even for violence-oriented or hate-oriented content, content is typically screened. Organizations also remove content associated with shopping and work.

It is possible to divide content filtering into the following categories :-
  • Filtering the web
  • Screening of websites or Web sites
  • Filtering of E-mail
  • The e-mail screening for spam
  • Additional objectionable content

Intrusion Detection Systems

Intrusion Detection Systems , also known as Intrusion Detection and Prevention Systems, are tools that monitor and record information about malicious activities in a network, take action to avoid them, and eventually report them.

Intrusion detection systems help to send an alarm against any malicious network behaviour, drop packets, and reset the link to avoid any blockage of the IP address. The following actions may also be taken out by intrusion detection systems,

  • Correct Cyclic Redundancy Check (CRC) errors
  • Preventing issues with TCP sequencing
  • Clean up unwanted choices for transport and the network layer