Security+ Guide to Network Security Fundamentals Chapter 12 Review Questions

Cristian Dina/Shutterstock

Network security is the combination of policies and procedures implemented by a network administrator to avoid and go on track of unauthorized access, exploitation, modification or denial of the network and network resources. The primary purpose of network security is to foreclose a network security assail which ways whatever method, process, or means that can be used to attempt to compromise network security maliciously. Network security attacks can either be active or passive. Agile attacks involve a network exploit in which an assaulter attempts to change information transmitted to a specified target while a passive set on is unauthorized monitoring of a network system.

How Does Network Security Piece of work?

A network security system combines multiple layers to address network security across an organization. The first layer enforces network security through a username/password mechanism assuasive simply authenticated users with customized privileges to admission the network. When a user is granted access into the network organization, the network policies are enforced by the network's configured firewall which restricts a user to particular services.

The configuration software, withal, cannot observe or prevent viruses and malware which is harmful to the network leading to loss of data. Antivirus software or an intrusion prevention system (IPS) is therefore integrated into the network security as the 2d layer to prevent viruses and other harmful malware from attacking the network.

Access Command and Application Security

 Access command is a network security method that recognizes each user device enforced on security policy and helps keep out potential network attackers. It employs Network Access Control (NAC) to block noncompliant endpoint devices or limit their access. Application security is also important since any application may contain vulnerabilities that can be used by attackers to gain unauthorized admission to the network.

Application security includes the hardware, software and processes that are employed to limit these vulnerabilities. Behavioral analytics are tools used to monitor a network user's behavior to discover abnormal behavior. These tools automatically discern network activities that deviate from the norm. In plough they place indicators of a potential network compromise and quickly remediate threats.

Antivirus Software and Firewalls

Antiviruses and firewalls are the almost usually known network security methods. Malicious software including viruses, worms, Trojans, ransomware and spyware are unsafe to network systems as they often atomic number 82 to loss of data. Antivirus and antimalware software detect malware upon entry and also analyze files later on to establish anomalies, remove malware and set up the damage. Firewalls can either exist hardware, software or both and function as a barrier between a trusted internal network and an untrusted outside network such every bit the internet using a defined set up of policies that can either allow or prevent traffic.

Intrusion Prevention Systems and VPNs

 Intrusion Prevention Systems (IPS) are employed to block network attacks past actively scanning network traffic. These systems not only block malicious attacks but besides continuously track suspicious files and malware that may have gained entry into the network to prevent the spread of outbreaks and reinfection.

Virtual Individual Networks (VPNs) let communication between 2 systems. Data between these two points is encrypted, and users would need to authenticate themselves to enable communication between their devices and the network. Other network security types include Information loss prevention, e-mail security, mobile device security, web security, security information, result direction and wireless security.

Benefits of Network Security

With almost every organization having an online presence, network security have to keep out malicious attacks that could compromise an organization's data. Simply a few minutes of downtime is capable of causing widespread damage to an system's operations. In that location are multiple methods, applications, tools and utilities companies and individuals can use to successfully secure their network systems, to preclude avoidable attacks and unnecessary downtime. Network security consists of several layers designed to implement policies and controls thus allowing only authorized users to gain access to network resources and at the same fourth dimension block malicious attackers from gaining entry into the network.

fitchettfook1995.blogspot.com

Source: https://www.bloglines.com/article/what-is-network-security?utm_content=params%3Ao%3D740010%26ad%3DdirN%26qo%3DserpIndex

0 Response to "Security+ Guide to Network Security Fundamentals Chapter 12 Review Questions"

ارسال یک نظر

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel