Network security device
,
Firewall, A firewall is a network security system that monitors and controls over all your incoming and outgoing network traffic based on advanced and a defined set of security rules.
- firewall block "packet flittering" it can block any unwanted packet from the outsider network and since they are always on they can protect the network 24/7 of protection.
-newer hardware firewall can analyze the packet whether its a malware or cyberattack or its irregular activities
Router devices used to route packets between different networks, and to connect your network with the Internet
-router allows to specify MAC addresses in the router and restrict access to all other devices that attempt to connect to the network.
-some router have firewall implemented that can block outside access
VPN Gateway, A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.
-tunneling, turning the packet inside another data packet that ensure a layer of security via the internet and network
-encryping packet, where each packet have encryption key and that key shared between the sender and receiver in the network. Encapsulation header is a subprotocol that certain packet information
Secure Modems, A modem is a hardware device that allows a computer to send and receive data over a telephone line or a cable or satellite connection.
-
Intrusion Detection System, to detect whether someone or something is trying up to suspicious activity. When it detects something, it notifies the system administrator.
-An IDS analyzes the amount and types of attacks. This information can be used to change your security systems or implement new controls that are more effective.
-an IDS can tell you which machines it compromised, as well as how it is propagating through the network to infect other machines.
Network Switch, a switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take it toward its intended destination.
-switch saved the record of MAC addresses so when data is transfer it will not increase the response time
-With the ability to examine the traffic flow, comes the ability to decide how to control and optimize it, such as network segmentation with multiple groups.
-able to logically group devices together to isolate traffic between groups, even when the traffic is passing over the same physical switch.
Comments
Post a Comment