Topic 2. Network Security
Topic 2. Network Security
Topic 2. Network Security
Network Security
Network security refers to the various countermeasures put in place to protect the network and data stored on
or passing through it. Network security works to keep the network safe from cyberattacks, hacking attempts,
and employee negligence.
Hardware appliances are servers or devices that perform certain security functions within the networking
environment. Hardware can be installed out of the path of network traffic, or “out-of-line,” but it’s more
commonly installed in the path of traffic, or “in-line.” The advantage of this is that in-line security
appliances are able to stop data packets that have been flagged as potential threats, whereas out-of-line
appliances simply monitor traffic and send alerts when they detect something malicious.
Network security software, which includes antivirus applications, can be installed on devices and nodes
across the network to provide added detection and threat remediation.
Cloud services refer to offloading the infrastructure to a cloud provider. The set-up is generally similar to
how network traffic passes through in-line hardware appliances, but incoming network traffic is redirected to
the cloud service instead. The cloud service does the work of scanning and blocking potential threats for you
before the traffic is allowed onto your network.
Every good network security system uses a combination of different types of network security tools to create
a layered defense system. The theory behind this strategy is that if a threat manages to slip past one security
countermeasure, the other layers will prevent it from gaining entry to the network. Each layer provides
active monitoring, identification, and threat remediation capabilities in order to keep the network as secure
as possible. Ref: https://www.n-able.com/blog/types-of-network-security#:
Network Security protects your network and data from breaches, intrusions and other threats. This is a vast
and overarching term that describes hardware and software solutions as well as processes or rules and
configurations relating to network use, accessibility, and overall threat protection.
Network Security involves access control, virus and antivirus software, application security, network
analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN encryption and more.
Network Security is vital in protecting client data and information, keeping shared data secure and ensuring
reliable access and network performance as well as protection from cyber threats. A well designed network
security solution reduces overhead expenses and safeguards organizations from costly losses that occur from
a data breach or other security incident. Ensuring legitimate access to systems, applications and data enables
business operations and delivery of services and products to customers.
2. Mitigates risk
The right network security solution will help your business stay compliant with business and government
regulations, and it will minimize the business and financial impact of a breach if it does occur.
1
3. Protects proprietary information
Your clients and customers rely on you to protect their sensitive information. Your business relies on that
same protection, too. Network security ensures the protection of information and data shared across the
network.
A. Firewall
Firewalls control incoming and outgoing traffic on networks, with predetermined security rules. Firewalls
keep out unfriendly traffic and are a necessary part of daily computing. Network Security relies heavily on
Firewalls, and especially Next Generation Firewalls, which focus on blocking malware and application-layer
attacks.
B. Network Segmentation
Network segmentation defines boundaries between network segments where assets within the group have a
common function, risk or role within an organization. For instance, the perimeter gateway segments a
company network from the Internet. Potential threats outside the network are prevented, ensuring that an
organization’s sensitive data remains inside. Organizations can go further by defining additional internal
boundaries within their network, which can provide improved security and access control.
E. Email Security
Email security refers to any processes, products, and services designed to protect your email accounts and
email content safe from external threats. Most email service providers have built-in email security features
designed to keep you secure, but these may not be enough to stop cybercriminals from accessing your
information.
2
G. Intrusion Prevention Systems (IPS)
IPS technologies can detect or prevent network security attacks such as brute force attacks, Denial of Service
(DoS) attacks and exploits of known vulnerabilities. A vulnerability is a weakness for instance in a software
system and an exploit is an attack that leverages that vulnerability to gain control of that system. When an
exploit is announced, there is often a window of opportunity for attackers to exploit that vulnerability before
the security patch is applied. An Intrusion Prevention System can be used in these cases to quickly block
these attacks.
H. Sandboxing
Sandboxing is a cybersecurity practice where you run code or open files in a safe, isolated environment on a
host machine that mimics end-user operating environments. Sandboxing observes the files or code as they
are opened and looks for malicious behavior to prevent threats from getting on the network. For example
malware in files such as PDF, Microsoft Word, Excel and PowerPoint can be safely detected and blocked
before the files reach an unsuspecting end user.
Ref: https://www.checkpoint.com/cyber-hub/network-security/what-is-network-security/
3
What are the principles of network security?
There are three principles within the concept of network security:
1. confidentiality
2. integrity, and
3. availability
Together are sometimes referred to as the “CIA triad.” A network can only be considered secure when it has
all three elements in play simultaneously.
Confidentiality works to keep sensitive data protected and sequestered away from where it can be accessed
by the average user. This goes hand-in-hand with the principle of availability, which seeks to ensure that
data and resources are kept accessible for those who are authorized to access them. Challenges to availability
can include DDoS attacks or equipment failure. The principle of integrity seeks to protect information from
intentional or accidental changes in order to keep the data reliable, accurate, and trustworthy.
The goal of vulnerability management is to reduce the organization's overall risk exposure by mitigating as
much vulnerability as possible. This can be a challenging task, given the number of potential vulnerabilities
and the limited resources available for remediation. Vulnerability management should be a continuous
process to keep up with new and emerging threats and changing environments.
2. Vulnerability scanning
Vulnerability scanners usually work by conducting a series of tests against systems and networks, looking
for common weaknesses or flaws. These tests can include attempting to exploit known vulnerabilities,
guessing default passwords or user accounts, or simply trying to gain access to restricted areas.
3. Patch management
Patch management software is a tool that helps organizations keep their computer systems up to date with
the latest security patches. Most patch management solutions will automatically check for updates and
prompt the user when new ones are available. Some patch management systems also allow for deployment
of patches across multiple computers in an organization, making it easier to keep large fleets of machines
secure.
4. Configuration management
Security Configuration Management (SCM) software helps to ensure that devices are configured in a secure
manner, that changes to device security settings are tracked and approved, and that systems are compliant
with security policies. Many SCM tools include features that allow organizations to scan devices and
4
networks for vulnerabilities, track remediation actions, and generate reports on security policy compliance.
6. Penetration testing
Penetration testing software is designed to help IT professionals find and exploit vulnerabilities in computer
systems. Typically, penetration testing software provides a graphical user interface (GUI) that makes it easy
to launch attacks and see the results. Some products also offer automation features to help speed up the
testing process. By simulating attacks, testers can identify weak spots in systems that could be exploited by
real-world attackers.
7. Threat intelligence
Threat protection software provides organizations with the ability to track, monitor, analyze, and prioritize
potential threats to better protect themselves. By collecting data from a variety of sources—such as exploit
databases and security advisories—these solutions help companies identify trends and patterns that could
indicate a future security breach or attack.
8. Remediating vulnerabilities
Remediation involves prioritizing vulnerabilities, identifying appropriate next steps, and generating
remediation tickets so that IT teams can execute on them. Finally, remediation tracking is an important tool
for ensuring that the vulnerability or misconfiguration is properly addressed.
Ref: https://www.microsoft.com/en-ww/security/business/security-101/what-is-vulnerability-management