buga Flashcards
refers to the measures taken by any enterprise or organization to secure its computer network and data using both hardware and software systems. This aims at securing the confidentiality and accessibility of the data and network.
Network Security
The network security solutions protect various vulnerabilities of the computer systems such as:
Users
Locations
Data
Devices
Applications
This is the most basic level that includes protecting the data and network through unauthorized personnel from acquiring control over the confidentiality of the network.
Physical Network Security:
It primarily focuses on protecting the data stored in the network or data involved in transitions through the network. This type serves two purposes.
Technical Network Security
This level of network security protects user behavior like how the permission has been granted and how the authorization process takes place.
Administrative Network Security
This method limits access to network applications and systems to a specific group of users and devices. These systems deny access to users and devices not already sanctioned.
Access control
are software designed to detect, remove or prevent viruses and malware, such as Trojan horses, ransomware and spyware, from infecting a computer and, consequently, a network.
Antivirus and antimalware
It is crucial to monitor and protect applications that organizations use to run their businesses. as modern malware threats often targetopen sourcecode and containers that organizations use to build software and applications.
Application security
This method analyzes network behavior and automatically detects and alerts organizations to abnormal activities.
Behavioral analytics
Cloud providers often sell add-oncloud securitytools that provide security capabilities in their cloud. The cloud provider manages the security of its overall infrastructure and offers tools for the user to protect their instances within the overall cloud infrastructure
Cloud security
These tools monitor data in use, in motion and at rest to detect and prevent data breaches.
Data loss prevention (DLP).
IPSesare designed to prevent intrusions by detecting and blocking unauthorized attempts to access a network.
Intrusion prevention system
Business applications for smartphones and other mobile devices have made these devices an important part of network security.
Mobile device security
an easy-to-employ and increasingly popular network security solution that requires two or more factors to verify a user’s identity
Multifactor authentication (MFA).
This approach gives organizations more control of and increased visibility into traffic flow. Industrial network security is a subset of network segmentation, providing increased visibility into industrial control systems (ICSes).
Network segmentation
This approach lets organizations scan for malware by opening a file in an isolated environment before granting it access to the network.
Sandboxing
This security management technique logs data from applications and network hardware and monitors for suspicious behavior. When an anomaly is detected, theSIEMsystem alerts the organization and takes other appropriate action.
Security information and event management (SIEM)
method that sits on top of the network it protects, concealing it from attackers and unauthorized users. It uses identity criteria to limit access to resources and forms a virtual boundary around networked resources.
Software-defined perimeter (SDP).
secures the connection from an endpoint to an organization’s network. It uses tunneling protocols to encrypt information that is sent over a less secure network.
Virtual private network (VPN).
This practice controls employee web use on an organization’s network and devices, including blocking certain threats and websites, while also protecting the integrity of an organization’s websites themselves.
Web security
are one of the riskiest parts of a network and require stringent protections and monitoring. It’s important to followwireless security best practices, such as segmenting Wi-Fi users by service set identifiers, or SSIDs, and using 802.1Xauthentication.
Wireless security.
measures and secureload balancersare crucial to protecting the data contained in these workloads.
Workload security
Similar to network access control, only grants a user the access they must have do their job. It blocks all other permissions.
. Zero-trust network access
Network security ensures the ongoing high performance of the networks that businesses and individual users rely on.
Functionality
Network security prevents the security breaches that can expose PII and other sensitive information, damage a business’s reputation and result in financial losses.
Privacy and security
Securing access to intellectual property related to products, services and business strategies helps organizations maintain their competitive edge.
Intellectual property protection
Complying with data security and privacy regulations, such as HIPAA and GDPR, is legally required in many countries
Compliance
The biggest network security challenge is the rate at which cyber attacks evolve. Threat actors and their methods constantly change as technology changes
Evolving network attack methods.
As mentioned, security is every network user’s responsibility. It can be difficult for organizations to ensure that everyone is adhering to network security best practices, while simultaneously evolving those strategies to address the newest threats.
User adherence
Remote work is also more prevalent. This makes wireless security more important, as users are more likely to be using a personal or public network when accessing company networks.
Remote and mobile access
Cloud providers, managed security services and security product vendors often get access to an organization’s network, opening new potential vulnerabilities.
Third-party partners
one of the highest-paying positions in network security. responsible for developing and implementing an overall information security program.
Chief information security officers(CISOs)
are hired to break into a corporate network to expose vulnerabilities. This can be automated or performed manually by employees or third-partypen testing-as-a-service providers.
Penetration testers