NETWORK SECURITY

NETWORK SECURITY

Article by Tsaaro

7 min read

NETWORK SECURITY

Introduction

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact and on the connective fabric.

A network is secure only when it possesses the components that constitute the “CIA Triad.”

CIA triad is a distinguished model for the development of network security policies within an organization. It deals with the three crucial areas of security, namely, Confidentiality, Integrity, and Availability.

The fundamentals of network security are:

Physical security – Network equipment should be protected from physical harm and should be placed in a protected, designated environment with high security.

  1. Access Controls –

Users should have limited access on network resources based on their profiles and roles. Every application, network device or resource should have an access control list to ensure only authorized personnel access the resource.

  1. Authentication

Every network resource should be protected from unauthorized use. Users or applications requesting access to a network resources should be asked for password as a basic security check. Authentication basically possess the question “Are you who you really say you are”. Authentication could consist of three key features which are:

  • “something you know” – Ex. Password
  • “something you are” – Ex. Fingerprint, Face scan, Iris Scan
  • “something you have” – Ex. Smart Card
  1. Accountability

Every user action on the network or infrastructure should be strictly mapped to a department or individual at all costs. This will help track changes and ensure all user actions are accountable.

There are many types of network security devices:

  1. Firewalls:

Firewalls put up a barrier between your trusted internal network and untrusted outside networks, such as the Internet. They use a set of defined rules to allow or block traffic. A firewall can be hardware, software, or both. Organizations offers unified threat management (UTM) devices and threat-focused next-generation firewalls

Network Security has many layers of threat detection, including different types of firewall protection such as:

  • Packet filtering: A small amount of data is analysed and distributed according to the filter’s standards.
  • Proxy service: Network security system that protects while filtering messages at the application layer.
  • Stateful inspection: Dynamic packet filtering that monitors active connections to determine which network packets to allow through the Firewall.
  • Next Generation Firewall: Deep packet inspection Firewall with application-level inspection.
  1. Email security

Email gateways are the number one threat vector for a security breach. Attackers use personal information and social engineering tactics to build sophisticated phishing campaigns to deceive recipients and send them to sites serving up malware. An email security application blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data.

  1. Anti-virus and anti-malware software

“Malware,” short for “malicious software,” includes viruses, worms, Trojans, ransomware, and spyware. Sometimes malware will infect a network but lie dormant for days or even weeks. The best antimalware programs not only scan for malware upon entry, but also continuously track files afterward to find anomalies, remove malware, and fix damage

  1. Network segmentation

Software-defined segmentation puts network traffic into different classifications and makes enforcing security policies easier. Ideally, the classifications are based on endpoint identity, not mere IP addresses. You can assign access rights based on role, location, and more so that the right level of access is given to the right people and suspicious devices are contained and remediated

Leave a Reply

Your email address will not be published. Required fields are marked *

Shubham Bansal

Today, technology continues to evolve, with companies all over the globe required to adapt to the constant evolution. It is …

Shubham Bansal

INTRODUCTION:  Data governance is an instrument for determining who within an organization is responsible for overseeing data assets and establishing …

Shubham Bansal

INTRODUCTION: GRC, which stands for Governance, Risk, and Compliance, is a complete system that helps organizations handle risks, follow laws, …

Shubham Bansal

Introduction In a recent survey conducted roughly a 58 million Americans identify as independent workers, who are not employed in …

Shubham Bansal

Introduction: The term Internet of Things (IoT) was first mentioned by Peter T. Lewis at an annual event where he …

Recent Comments

    SHARE THIS POST

    Would you like to read regular updates from Tsaaro.
    Subscribe to our newsletter

    Our Latest Blogs

    Read what the latest hapennings in the cyber world are and learn what the
    experts have to say about them