buga Flashcards
(83 cards)
refers to the measures taken by any enterprise or organization to secure its computer network and data using both hardware and software systems. This aims at securing the confidentiality and accessibility of the data and network.
Network Security
The network security solutions protect various vulnerabilities of the computer systems such as:
Users
Locations
Data
Devices
Applications
This is the most basic level that includes protecting the data and network through unauthorized personnel from acquiring control over the confidentiality of the network.
Physical Network Security:
It primarily focuses on protecting the data stored in the network or data involved in transitions through the network. This type serves two purposes.
Technical Network Security
This level of network security protects user behavior like how the permission has been granted and how the authorization process takes place.
Administrative Network Security
This method limits access to network applications and systems to a specific group of users and devices. These systems deny access to users and devices not already sanctioned.
Access control
are software designed to detect, remove or prevent viruses and malware, such as Trojan horses, ransomware and spyware, from infecting a computer and, consequently, a network.
Antivirus and antimalware
It is crucial to monitor and protect applications that organizations use to run their businesses. as modern malware threats often targetopen sourcecode and containers that organizations use to build software and applications.
Application security
This method analyzes network behavior and automatically detects and alerts organizations to abnormal activities.
Behavioral analytics
Cloud providers often sell add-oncloud securitytools that provide security capabilities in their cloud. The cloud provider manages the security of its overall infrastructure and offers tools for the user to protect their instances within the overall cloud infrastructure
Cloud security
These tools monitor data in use, in motion and at rest to detect and prevent data breaches.
Data loss prevention (DLP).
IPSesare designed to prevent intrusions by detecting and blocking unauthorized attempts to access a network.
Intrusion prevention system
Business applications for smartphones and other mobile devices have made these devices an important part of network security.
Mobile device security
an easy-to-employ and increasingly popular network security solution that requires two or more factors to verify a user’s identity
Multifactor authentication (MFA).
This approach gives organizations more control of and increased visibility into traffic flow. Industrial network security is a subset of network segmentation, providing increased visibility into industrial control systems (ICSes).
Network segmentation
This approach lets organizations scan for malware by opening a file in an isolated environment before granting it access to the network.
Sandboxing
This security management technique logs data from applications and network hardware and monitors for suspicious behavior. When an anomaly is detected, theSIEMsystem alerts the organization and takes other appropriate action.
Security information and event management (SIEM)
method that sits on top of the network it protects, concealing it from attackers and unauthorized users. It uses identity criteria to limit access to resources and forms a virtual boundary around networked resources.
Software-defined perimeter (SDP).
secures the connection from an endpoint to an organization’s network. It uses tunneling protocols to encrypt information that is sent over a less secure network.
Virtual private network (VPN).
This practice controls employee web use on an organization’s network and devices, including blocking certain threats and websites, while also protecting the integrity of an organization’s websites themselves.
Web security
are one of the riskiest parts of a network and require stringent protections and monitoring. It’s important to followwireless security best practices, such as segmenting Wi-Fi users by service set identifiers, or SSIDs, and using 802.1Xauthentication.
Wireless security.
measures and secureload balancersare crucial to protecting the data contained in these workloads.
Workload security
Similar to network access control, only grants a user the access they must have do their job. It blocks all other permissions.
. Zero-trust network access
Network security ensures the ongoing high performance of the networks that businesses and individual users rely on.
Functionality