Network Security Basic


Security devices and Technologies
1-Router
2-Swtiches
3-Firewall (NGFW)
4-Content Security Firewalls
5-IPS
6-VPN
7-Logging and Monitoring
8-ACS (Access control server)
9-ISE
10-WSA
11-ESA

Security Terminology

Accept

  1. Anything that is valuable to organization (that is to be protected)
  2. Can include Property, People, and information/data that have value to the company
  3. Proprietary information or trade secrets and the reputation of the company
  4. Company records, client information, proprietary software and so on

Vulnerability

⦁ Weakness which allows attacker to reduce the security assurance
⦁ Vulnerability can be found in

  1. Protocols
  2. OS
  3. Application
  4. System Design

Security Terminology (Cont.)


Threat

⦁ Event which causes damage to systems, exploiting a vulnerbility
⦁ Physical (Fire, water, Earthquake)
⦁ Malicious code (cirus, Trojan, Malware)
⦁ Phishing & social Engineering

RISK
⦁ The Probability of a threat or event to happen
⦁ Potential to unauthorized access to asset
⦁ Potential to compromise of asset
⦁ Potential to destruction/damage of asset

Primary Goal of Network Security


Network security objectives usually involve three basic concepts:
⦁ Confidentially
⦁ Integrity
⦁ Availability
⦁ Also knnow as the CIA triad, is a model of designed to guide policies for the information security within an organization

Confidentiality
⦁ Only the authorized individuals/ system can view sensitive or classified information
⦁ Unauthorized individuals should not have any type of access to the data
⦁ Protect that data is to encrypt it before sending it.

Integrity
⦁ Changes made to data are done only by authorized individuals/ system
⦁ Corruption of data is failure to maintain data integrity
⦁ include file permissions and user access controls

Scalability
⦁ If the network or its data is not available to authorized users
⦁ Because of a Network issue or Denial-of-services (DoS) attack
⦁ The impact may be significant to companies and users who reply on that network as a business tool
⦁ The failure of a system, to included data, applications, devices and networks
⦁ Generally equates to loss of revenue

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top