Types of Network Security

Types of Network Security

What types of network security do we have?

We divide the Types of Network Security into two parts:

 

  • Software programs
  • Hardware parts

The best choice is to use both (software and hardware) together. Software programs such as Anti-worms, Anti-viruses, Firewalls, etc. Hardware components also include firewalls. It can control and scan the input and output ports. Microsoft has provided this feature for its users in Windows, but this software alone does not provide sufficient computer security.

Some examples of strong anti-malware programs are Antivirus, Symantec, Kaspersky, Nod32, Bitdefender, Norton, Panda, Mac

For hardware parts, you can mention Cisco ASA or Astaro Firewall. The best and safest solution for large organizations is to use two hardware devices at the same time, so that if one of them has a problem, the second device can continue working.

One of the most important actions in network security is to prepare a backup copy of information and files on a backup server. In terms of security, if there is an attack and a failure occurs in the files or the system, we must be able to read the backup immediately after cleaning the system.

Security in wireless networks:

in the topic of types of Network Security, since wireless networks are expanding every day and cable networks are becoming obsolete, it is especially important to know the weak points of these networks and find solutions to increase their security.

Here are some security methods that use in wireless networks:

  • WEP: Wired Equivalent Privacy: In this method, which is suitable for small networks, it blocks users who do not have permission in the network.
  • SSID: Service Set Identifier: These identifiers are placed in several Access Points and each user must configure the corresponding SSID identifier.
  • MAC: Media Access Control: In this method, only the computers whose MAC address has already been saved and are part of the list are allowed to access. This method is exceedingly difficult for large networks because all addresses must be stored.

The weakness of wireless networks:

One of the biggest disadvantages of these networks is the borderless coverage of the network structure, which means that vandals can receive its signals near this network and in case of breaking the not so strong security barriers of these networks, they can pretend to be a member of these networks. bring and have the possibility of obtaining vital information and destruction.

Ways to increase the security of systems

  • Check that the operating system and installed programs are up to date
  • Checking settings and detecting vulnerabilities
  • Installing anti-virus programs
  • Encoding data and files
  • Control user access to files, for example, edit and delete only specific users, and all users have read-only access.

What are benefit of using Firewall:

  • We can manage and control policies and services separately
  • Selection of input and output services to the network
  • Security control and user access management
  • Protecting and preventing those who intend to infiltrate the internal network
we can divide Firewalls into several categories:
  1. Circuit-level firewalls: this group disconnects the network connection with the computer behind them and takes the initial response instead of that computer, and if they are satisfied with the security of the connection, then they allow the data to go to the computer. flow This type has good speed because they do not check any data inside the packets
  2. Proxy server firewalls: In this type, information packets are checked in the application layer, and it provides high security by preventing the direct connection of the program with the servers, but this level of checking can lead to the slowness of these firewalls.
  3. No stateful packet filters: These filters allow packets to pass or block them in network layer protocols such as IP or in transport layer protocols such as TCP and UDP headers in the path of a network with a set of rules.
  4. Stateful Packet filters: These filters are much smarter and block all incoming traffic. They create connection records at the transport layer and are the basis of firewall implementation in modern networks. They store source and destination TCP and UDP port numbers, TCP sequence numbers and TCP flags, and can detect application layer protocols such as FTP and HTTP.
  5. Personal firewalls: Personal firewalls are installed on personal computers and are designed to deal with network attacks. The suggestion of installing on personal computers is extremely high

You can find other learning for Network Security by clicking here.

Network Security

Network Security

What is Network Security?

Network Security

One of the main topics of computer networks is Network Security. After configuring and deploying the hardware, we must pay special attention to this topic. In this section, we will examine the following:

  • What is computer network security?
  • Wireless networks
  • Firewall

What is computer network security?

It includes things like software used, data stored, and information theft. Everything that is used in a computer network system (both software and hardware) must be protected against attacks and risks.

Three principal factors are needed in the security of a computer network, these three factors (CIA) are the basic principles of information-security in information storage and exchange environments.

Network Security

  • Confidentiality
  • integrity
  • Availability
Confidentiality:

That is, the information should be available only to those who need it. For example, leaving part of a company’s confidential file

Network Security

Integrity: 
  • Just authorized persons or instructions can change system
  • authorized people or processes cannot change system without permission and without reason,
  • It is necessary to maintain the integrity of information inside and outside the system, and it must be the same inside and outside the system, and if the information changes, they must be aware of it both inside and outside the system.
Availability:

Information should always be available and able to do its job, and there should never be a factor that disrupts the system’s work. For example, if the power goes out and we don’t have a solution for it, this system is not safe.

Network Security

There are many concepts in the discussion of network security, which can be mentioned as these basic concepts:

  • Identification: requesting identification when the user accesses the system,
  • Authentication: specifying the user’s identity
  • Authorization: the level of user access to resources.
  • Accountability: ability to audit system performance

 

 

If you are interested in seeing some learning, you can click here.