Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 1: Introduction To Network (Key elements of network security…
Chapter 1: Introduction To Network
1.2 Requirements of network security
Confidentiality
refers to the protection of data from unauthorized disclosure to a third party
All customers possess the right to have their private information protected.
Integrity
Maintaining data consistency
refers to the assurance that data is not altered or destroyed in an unauthorized manner
integrity is maintained when the message sent is identical to the message received. Even for data that is not confidential, measures must be taken to ensure the integrity of the data.
Availability
Legitimate users have access when they need i
defined as the continuous operation of computing systems
These components include application and database servers, storage devices, and the end-to-end network.
security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation.
Key elements of network security
Identity
refers to the accurate and positive identification of network users, hosts, applications, services, and resources
Standard technologies that enable identification include authentication protocols such as Remote Access Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+), Kerberos, and one-time password (OTP) tools
Perimeter security
provides the means to control access to critical network applications, data, and services so that only legitimate users and information can pass through the network
provides the means to control access to critical network applications, data, and services so that only legitimate users and information can pass through the network
Complementary tools, including virus scanners and content filters, also help control network perimeters.
Data privacy
information must be protected from eavesdropping, the ability to provide authenticated, confidential communication on demand is crucial
additional privacy requirements often call for the use of digital encryption technology and protocols such as IP Security (IPSec)
This added protection is especially important when implementing Virtual Private Networks (VPNs).
Security monitoring
Network vulnerability scanners can proactively identify areas of weakness, and intrusion detection systems can monitor and respond to security events as they occur
By using security-monitoring solutions, organizations can obtain significant visibility into both the network data stream and the security posture of the network.
Policy managements
Sophisticated tools can analyze, interpret, configure, and monitor the state of security.
Browser-based user interfaces and tools enhance the usability and effectiveness of network security solutions.