Please enable JavaScript.
Coggle requires JavaScript to display documents.
NETWORK SECURITY FUNDAMENTALS, BY: BADIUZZAMAN - Coggle Diagram
NETWORK SECURITY FUNDAMENTALS
Malware can enter via?
Infected USB Flash
HTTP
Network security strategy
Network devices
Network technologies
Design of the network
Network Devices
Hubs
Switches
Traffic Monitoring
Port Mirroring
Allow admin to configure switch to copy traffic
Network Tap
Seperate device installed on network
Routers
Load Balancing
Security?
can detect and stop attacks directed at a server
detect and prevent DoS
Hide HTTP error page
Load Balancers
Proxies
Act as substitute on behalf of another human
Advantage?
Increased speed
Reduce costs
Improved management
Stronger Security
Reverse Proxies
routes incoming request to correct server.
Security Hardware
Network Firewalls
Protect entire network
Inspect packet and either accept or deny entry
Actions
Allow
Drop
Reject
Ask
Application-Aware Firewalls
Next Gen Firewalls
Spam Filter
SMTP
Listen port 25
POP
VPN
Internet Content Filters
monitor internet ttraffic and block access to preselected Web Sites and files
Gateways
Block malicous content in real time
Intrusion Detection and Prevention
Device that can detect an attack as it occurs
Intrusion Prevention System
Monitor to detect malicious activities like IDS but also attempt to prevent them.
NAT
allow private IP to be used in public internet
Advantage
mask IP address
Allow multilpe devices to share smaller number of public ip
NAC
Examines current state of system or network device before allow to connect.
Security Through Network Design Elements
Demilitarized zones
seperate network located outside secure network perimeter
Subenneting
can improve network
Virtual LANs
Segement network by separating devices into logical groups
Remote Access
enable remote users to access local internal network
BY: BADIUZZAMAN