What is Network Security ?
Typically, in medium to large enterprise networks, the various strategies for security are based on a some recipe of internal and perimeter routers plus firewall devices. Internal routers provide additional security to the network by screening traffic to various parts of protected corporate network, and they do this using access lists.
The demilitarized zone can be global (real).
The internet addresses or private addresses, depending on how you configure your firewall, But this is typically where you will find HTTP, DNS, EMAIL and other internet-type corporate servers.
Recognizing Network Threats: –
Security attacks vary considerably in their complexity and threat level, and some even happen because WUI, or witless user ignorance.
You see, it all comes down to planning, or rather, lack thereof. Basically, the vital tool that the Internet has become today was absolutely unforeseen by those who brought it into being.
Some common attack profiles: –
In this hackers use tool rootkit to probe, scan and then capture data on strategically positioned computer that’s poised to give the “eyes” into entire system.
These are simply paths leading into a computer or network. Through simple invasions, via more elaborate “Trojan horse” code. By using this, people can whatever they want to- until you can detect and stop them.
- BRUTE FORCE ATTACKS
Another software-oriented attack that employs a program running on targeted network that tries to log in some type of shared network resource like a server.
For the Hacker, It’s Ideal if the accessed accounts have a lot of privileges because then the hacker can form back doors to use for gaining access later and bypass the need for password entirely.
- TRUST EXPLOITATION ATTACKS
These happen when someone exploits a trust relationship inside your network. For example, A company’s perimeter network connection usually shelters important things like SMTP, DNS and HTTP Servers making the server really vulnerable because they are all on the same segment.
Different types of network security: –
- Access Control.
- Antivirus or anti-malware software.
- Application Security.
- Behavioral Analytical.
- Data Loss Prevention.
- Email Security.
- Mobile device Security.
- Web Security.
- Wireless Security.