Skip to main content

Network Security

                                        Network Security

     Network Security:  

               Network security is a one privacy  policy  which tries to keep a secure the whatever data,files,directories in your computer network.It gives security hardware as well as software.
                Authorization of access to data in network which is controlled by the network admin.Users are assigned only using their username and password.


Various way which gives security to the network

  1. Encryption
  2. Firewall
  3. Antivirus software
  4. IDS(Intrusion Detection System)
  5. IPS
  6. UTM    

1. Encryption:

        Encrypting communication  between two hosts its also gives a privacy that's security.

2. Firewall:

        Its one types physical barrier. It filter network traffic and reduce the risk that malicious packets travelling over the network.

3.Antivirus software:

         Its one virus protection software. Which prevent to viruses,worms and Trojan horses.
Its contains bundles of anti-spyware,anti-malware,firewall,PC-Optimization, file-protection.

4.IDS (Intrusion Detection System):

       An IDS is a device or software application that monitors a network or system malicious activity.
Its sending up alerts when it finds such items.

5. IPS(Intrusion Prevention System):

       Main work of an IPS is to identify suspicious activity, log information attempt to block the activity . Most of uses for the prevent the D-DOS activity.
     It includes:
            i. sending a alarm to an administrator 
           ii. Dropping the malicious packet
          iii. Blocking traffic from the source address
           iv. Resetting the connection

6. UTM (Undefined Threat Management):

         Its one security related term. It includes anti-spyware, anti-spam, network fire walling,intrusion detection and prevention,content filtering and leak prevention.It also provide facilities of  Network Address Translation(NAT),Virtual Private Network(VAN).
       



                                            





Comments

Popular posts from this blog

Piconet and Scatternet

                                 Piconet and Scatternet         Transfer a data to various people  its become most important now a days. There are a lots of methods are available to  share to data or transfer to data.But I explain here about the Bluetooth  Piconet and Scatternet. Piconet:           Piconet gets its name fro the world "pico". Pico means a very small.         A piconet is nothing but small network. Using this network we can share the data or transfer the data .Its one ad-hoc network.Which links a wireless user group of devices,using Bluetooth  technology.         Piconet is formed at least two devices such as portable PC and a cellular phone to connect. Ad maximum 8 to need to make this network.When network is established, one device act as master and other as sa...

Basic Network Concepts

                           Basic Network Concept (Part 1) What is Network?  Network is two or more peoples or systems want to communicate with each other. Another  way  we can say, network is any interconnection of two or more stations that wish to communicate with each other.    2. Computer Network Computer network is connection of computers the are interconnected with each other using a single technology. In computer network not only computers are connected with each other . The resources like a printer,scanner etc.and connecting device like hub, switch also connected with each other. These interconnected device are able to the communicate with each other means share a files,folders or exchange the information.   3. Components required for Networking: For networking two types of component are required:              ...

Dumpster Diving

                                     Dumpster Diving        Attacker does not launch their attack without any information. This information gets from targets trash.        If attacker gets the information from the targets trash is called Dumpster Diving.Its belongs to the Social Engineering.      In the dumpster diving the attacker search the small data in trash and it get very sticky information like a pin number,username,password etc,.       In computer security dumpster diving is like a dumping. That means the rubbish unwanted waste,unwanted materials etc,.           How to avoid Dumpster Diving? Avoid throwing sensitive information in the trash. Company should have some polices about to destroy trash. Company should contain trash container.