Network Hardware Security PDF
Document Details
Uploaded by SensitiveString2508
Islamia University of Bahawalpur
Tags
Summary
Introduction to network hardware security, including topics on firewalls, spam filters, VPN concentrators, internet content filters, and network access controls. The presentation discusses the purpose and function of these security measures, using diagrams and examples.
Full Transcript
NETWORK HARDWARE SECURITY Introduction to Cybersecurity Topic: Network security hardware (network firewalls, spam filters, virtual private network concentrators, Internet content filters, network access control (NAC) What is Network Security? Network Security is the protection of the underlyin...
NETWORK HARDWARE SECURITY Introduction to Cybersecurity Topic: Network security hardware (network firewalls, spam filters, virtual private network concentrators, Internet content filters, network access control (NAC) What is Network Security? Network Security is the protection of the underlying networking infrastructure from unauthorized access, misuse, or theft it. It involves creating a secure infrastructure for devices, applications, users, and applications to work in a secure manner. Network Security Hardware ia a set of tools designed to protect your computer network. The purpose of network security hardware is to protect your network from unauthorized access. Network security hardware can be used to protect both wired and wireless networks. This hardware typically includes firewalls, intrusion detection systems, and encryption devices. How does network security works? The elements of a complete, multilayered security architecture that implements network security across an organization fall into two general categories: access control Threat control Network firewalls: A firewall is a network security system, either hardware or software base that control incoming and outgoing network traffic based on set of rules. Types Of Firewall : Hardware Firewall Software Firewall Hardware Firewalls : Example of hardware firewalls are routers through which the network is connected to the network outside the organization i.e. Internet. Software Firewalls : These firewalls are installed and installed on the server and client machines and it acts as a gateway to the organizations network. Characteristics of Good Firewall : Characteristics of a good firewall : Firewall should be strong Only authorized traffic should be allowed All traffic must pass through firewall. Disadvantages of firewall: Insider Intrusion Direct Internet Virus Attack How does a firewall actually work? Firewalls are network security systems that prevent unauthorized access to a network. It can be a hardware or software unit that filters the incoming and outgoing traffic within a private network, according to a set of rules to spot and prevent cyberattacks. Firewalls are used in enterprise and personal settings. Spam filter: A spam filter is a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user's inbox. Like other types of filtering programs, a spam filter looks for specific criteria on which to base its judgments. Example: whenever users mark emails from a specific sender as spam, the Bayesian filter recognizes the pattern and automatically moves future emails from that sender to the spam folder. How does a spam filter work? Spam filters use a lot of different criteria to assess incoming email. After looking at each factor, spam filters assign a spam score. This score determines if an email will pass through the filter. Passing scores vary depending on the server, so an email could pass through some filters but not others. VPN Concentrator: A VPN concentrator is a hardware device that creates and helps to manage multiple VPN connections remotely. Similarly to a VPN, it encrypts outgoing and incoming data and uses security protocols to create safe tunnels, but on a larger scale. It is widely used by large companies with many remote employees. Example: VPN concentrators are used to connect many remote networks and clients to a central corporate network. They are used to protect the communications between remote branches or remote clients -- such as workstations, tablets, phones and IoT devices -- to corporate networks. Working of VPN concentrator : A VPN concentrator is a hardware device that creates and helps to manage multiple VPN connections remotely. Similarly to a VPN, it encrypts outgoing and incoming data and uses security protocols to create safe tunnels, but on a larger scale. It is widely used by large companies with many remote employees. How we secure our network with Vpn. A VPN concentrator primarily adds the capabilities of a VPN router by adding advanced data and network security to the communications.... It can: Establish and configure tunnel Authenticate user Assign tunnel/IP addresses to user Encrypt and decrypt data Ensure end-to-end delivery of data. Internet content filters: An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software determines what content will be available or be blocked. Such restrictions can be applied at various levels: a government can attempt to apply them nationwide (see Internet censorship), or they can, for example, be applied by an internet service provider to its clients, by an employer to its personnel, by a school to its students, by a library to its visitors, by a parent to a child's computer, or by an individual users to their own computers. Types of filtering: Keyword Filtering Category Web Content Filtering URL Filtering Browser-Based Internet Content Filters Search Engine Content Filters Inline Web Filters Firewalls Level of Control (Granularity) Pros and Cons : Tightened. network security. Web content filtering adds a much- needed layer of security to the network by blocking access to sites that raise an alarm Faster network. Connection Reduced inappropriate. Content The benefits of web filtering. Keeping our networks secure. Network Access control : Network access control, also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network. It restricts the availability of network resources to endpoint devices and users that comply with a defined security policy. The NAC can also provide endpoint security protection such as antivirus software, firewall, and vulnerability assessment with security enforcement policies and system authentication methods. Importance of Network Access Control : Unauthorized users include cybercriminals, hackers and data thieves, and other bad actors that an organization must keep out. But businesses must also be gatekeepers for authorized users. This particularly applies to organizations that allow remote access to the enterprise network from non-corporate devices like mobile phones, laptops and tablets, or companies that allow employees working in the office to use personal devices. Both scenarios create security risks demanding organizations to address network security. Web Security Gateways A web security gateway is a piece of hardware or software that acts as a gateway between a company's internal network and the internet. It is designed to protect a company's internal network from attacks coming from the internet. It can also be used to block access to certain websites or content that a company does not want its employees to have access to. Intrusion Detection Systems An IDS is a system that monitors network traffic for malicious activity or policy violations. Any suspicious activity is typically logged and reported to an administrator. Web Security Gateways Intrusion prevention systems in cyber security refers to a technology that is designed to detect and prevent unauthorized access to computer networks. It monitors network traffic and identifies suspicious activity that may indicate an attempted attack. If an attack is detected, the system can take action to block it. Types of IDS A host-based intrusion detection system (HIDS) is a cyber security tool that monitors and analyzes a computer's activities in order to detect signs of intrusion or malicious activity. HIDS can be used to detect a wide variety of attacks, including buffer overflows, malware, denial-of- service attacks, and SQL injection attacks. A network intrusion detection system (NIDS) is a system that monitors network traffic for suspicious activity and raises alarms when such activity is detected. NIDSs are used to detect a wide range of attacks, including denial-of-service attacks, viruses, worms, and other malicious code. What is a Unified Threat Management appliances in Cyber security ? A Unified Threat Management appliance is a device that consolidates multiple security functions into a single unit. These functions can include firewall, intrusion detection and prevention, anti-virus, and anti-spam. What is a DDoS mitigation in cyber security ? A DDoS mitigation is a process used to protect a computer or network from a distributed denial of service attack. A DDoS attack is an attempt to make a system or network unavailable by flooding it with Internet traffic from multiple sources