0% found this document useful (0 votes)
22 views4 pages

Network Security concepts - Google Docs

Network Security encompasses various hardware and software solutions to protect networks and data from threats, including firewalls, access control, and remote access VPNs. Key components include Zero Trust Network Access, email security, and data loss prevention, which collectively enhance security measures against cyber threats. Additionally, advancements like hyperscale network security and cloud network security address the evolving landscape of data protection in modern infrastructures.

Uploaded by

Amruth RB
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views4 pages

Network Security concepts - Google Docs

Network Security encompasses various hardware and software solutions to protect networks and data from threats, including firewalls, access control, and remote access VPNs. Key components include Zero Trust Network Access, email security, and data loss prevention, which collectively enhance security measures against cyber threats. Additionally, advancements like hyperscale network security and cloud network security address the evolving landscape of data protection in modern infrastructures.

Uploaded by

Amruth RB
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

1.

Report on Network Security concepts


What is Network Security?
Network Security protects your network and data from breaches, intrusions
and other threats. This is a vast and overarching term that describes hardware
and software solutions as well as processes or rules and configurations
relating to network use, accessibility, and overall threat protection.
Network Security involves access control, virus and antivirus software,
application security, network analytics, types of network-related security
(endpoint, web, wireless), firewalls, VPN encryption and more.

Types of Network Security Protections

Firewall
Firewalls control incoming and outgoing traffic on networks, with
predetermined security rules. Firewalls keep out unfriendly traffic and are a
necessary part of daily computing. Network Security relies heavily on
Firewalls, and especially Next Generation Firewalls, which focus on blocking
malware and application-layer attacks.

Network Segmentation
Network segmentation defines boundaries between network segments where
assets within the group have a common function, risk or role within an
organisation. For instance, the perimeter gateway segments a company
network from the Internet.

What is Access Control?


Access control defines the people or groups and the devices that have access
to network applications and systems thereby denying unsanctioned access,
and maybe threats. Integrations with Identity and Access Management (IAM)
products can strongly identify the user and Role-based Access Control
(RBAC) policies ensure the person and device are authorised access to the
asset.
Remote Access VPN
Remote access VPN provides remote and secure access to a company
network to individual hosts or clients, such as telecommuters, mobile users,
and extranet consumers. Each host typically has VPN client software loaded
or uses a web-based client. Privacy and integrity of sensitive information is
ensured through multi-factor authentication, endpoint compliance scanning,
and encryption of all transmitted data.

Zero Trust Network Access (ZTNA)


The zero trust security model states that a user should only have the access
and permissions that they require to fulfil their role. This is a very different
approach from that provided by traditional security solutions, like VPNs, that
grant a user full access to the target network. Zero trust network access
(ZTNA) also known as software-defined perimeter (SDP) solutions permits
granular access to an organisation’s applications from users who require that
access to perform their duties.

Email Security
Email security refers to any processes, products, and services designed to
protect your email accounts and email content safe from external threats.
Most email service providers have built-in email security features designed to
keep you secure, but these may not be enough to stop cybercriminals from
accessing your information.

Data Loss Prevention (DLP)


Data loss prevention (DLP) is a cybersecurity methodology that combines
technology and best practices to prevent the exposure of sensitive information
outside of an organisation, especially regulated data such as personally
identifiable information (PII) and compliance related data: HIPAA, SOX, PCI
DSS, etc
Intrusion Prevention Systems (IPS)
IPS technologies can detect or prevent network security attacks such as brute
force attacks, Denial of Service (DoS) attacks and exploits of known
vulnerabilities. A vulnerability is a weakness for instance in a software system
and an exploit is an attack that leverages that vulnerability to gain control of
that system. When an exploit is announced, there is often a window of
opportunity for attackers to exploit that vulnerability before the security patch
is applied. An Intrusion Prevention System can be used in these cases to
quickly block these attacks.

Sandboxing
Sandboxing is a cybersecurity practice where you run code or open files in a
safe, isolated environment on a host machine that mimics end-user operating
environments. Sandboxing observes the files or code as they are opened and
looks for malicious behaviour to prevent threats from getting on the network.
For example malware in files such as PDF, Microsoft Word, Excel and
PowerPoint can be safely detected and blocked before the files reach an
unsuspecting end user.

Hyperscale Network Security


Hyperscale is the ability of an architecture to scale appropriately, as increased
demand is added to the system. This solution includes rapid deployment and
scaling up or down to meet changes in network security demands. By tightly
integrating networking and compute resources in a software-defined system, it
is possible to fully utilise all hardware resources available in a clustering
solution.

Cloud Network Security


Applications and workloads are no longer exclusively hosted on-premises in a
local data centre. Protecting the modern data centre requires greater flexibility
and innovation to keep pace with the migration of application workloads to the
cloud. Software-defined Networking (SDN) and Software-defined Wide Area
Network (SD-WAN) solutions enable network security solutions in private,
public, hybrid and cloud-hosted Firewall-as-a-Service (FWaaS) deployments.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy