Module 4 - Mindmap PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

Created by:

Diaz, Jaira Mae B. !. System memory and process protection


As you create a network security policy, you must define
CEIT-37-701A !. Hot-based IDS 2.Inline Network Devices 1. Recurring issue of false positives
1. Sensors 2. Network-based IDS 3. Session Snipping 2. Session sniping system identification procedures to defend your network and users against harm
2. Database Server
3. Intrusion Prevention System (IPS) 4. Gateway Interaction Devices 3. Another risk with active response IPSs
NETWORK DESIGN and loss. With this objective in mind, a network design and
Created for: 3. Management Server
TYPES OF INTRUSION
ELEMENTS AND the included components play an important role in
4. Console RISKS WHEN implementing the overall security of the organization
Information Assurance and Security 2 CATEGORIES PREVENTION
TECHNOLOGIES
DEPLOYING
COMPONENTS
Prof. Joy Salazar
FUNDAMENTAL
COMPONENTS
SUBNETTING
Denies all connections except for
An approach to information security in which a single Allows all connections except those
those specifically listed as acceptable. WEB APPLICATION
hardware or software installation provides multiple specifically listed as unacceptable. FIREWALL (WAF)
security functions (intrusion prevention, antivirus,
INTRUSION A secure network is a divided
content filtering and so forth). network. Subnetting divides a
Network firewall DETECTION
Intrusion detection WHITELISTING Built to provide web applications DESIGN AND network into smaller, more
SYSTEM (IDS) BLACKLISTING
security by applying a set of rules to
Intrusion prevention ELEMENTS manageable, components.
Gateway anti-virus UNIFIED THREAT an HTTP conversation.
VIRTUALIZATION
MANAGEMENT WIRELESS INTRUSION Enhances cybersecurity by spotting a hacker or
PREVENTION AND malicious software.
FEATURES UTM (UTM)
PROVIDES
DETENTION SYSTEM
Allows network administrators to move
(WIPDS) virtual machines across different domains
TWO TYPES OF without reconfiguring the network. DMZ
FIREWALL POLICIES PROXY FIREWALL

Standalone security device or integrated software


application that monitors a wireless LAN network’s
radio spectrum for rogue access points and other
A subnet used to keep
Aim for the Application layer in the public information separate
wireless security threats.
OSI model for their operations. from private information.
A network security control device that FIREWALL TYPES OF FIREWALL
restricts the availability of network NETWORK ACCESS NAC
resources to endpoint devices that CONTROL (NAC)
comply with your security policy.
One of a network's first lines of defense. Can be Defines the client requirements
standalone systems or they can be included in other STATEFUL
before granting access to the
network.
infrastructure devices. PACKET-FILTERING PACKET-FILTERING

NAT VLAN
Act as negotiators for requests from client software
2 KINDS OF seeking resources from other servers. Use a sophisticated approach, while
Primary and simple type of network REMOTE PAT
PROXY SERVER security firewall. still retaining the basic abilities of
ACCESS
packet-filtering firewalls. server hides a network Groups of segmented
CONFIGURE SECURITY from outside users by hosts that do not
displaying a small
1. Open Proxy Server PROXY SERVER PARAMETERS ON NETWORK Allow network connection TELEPHONY
A more limited option require the network
2. Reverse Proxy form of NAT amount of IP addresses
administrator to
DEVICES AND TECHNOLOGIES via remote systems. for connected
relocate nodes or
computers.
rewire data links.
INTERNET The merger of telecommunications
PROTOCOL and networking resulted in telephony,
SECURITY or Voice over IP (VoIP).

Prevent users’ browsers from loading certain pages of


particular websites. URL filtering involves blocking websites or The use of IPsec can secure

sections of websites based solely on the URL. It restricts access WEB FILTER transmissions between critical servers
and clients. This helps prevent SIMPLE NETWORK
to specified websites and certain web-based applications. ANTIVIRUS network-based attacks from taking
place.
MANAGEMENT

MODULE 4: PROTOCOL
SECURE SHELL

LOAD BALANCING
Software that is designed to detect, protect
against, and remove malware on a computer.
IMPLEMENTING SNMP is an application layer protocol
whose purpose is to collect statistics

METHODS NETWORK from TCP/IP devices.


The Secure Shell (SSH) utility
DOMAIN NAME
SERVICE

SECURITY
establishes a session between the
client and host computers using an
authenticated and encrypted
DIFFERENT WAYS connection. TRANSPORT
1. Round-robin NETWORK LOAD OF ANTIVIRUS DNS servers are organized in a
LAYER SECURITY
2. Affinity hierarchy. At the top level of the
BALANCER SPAM FILTER SOLUTIONS
3. Least Connection hierarchy, root servers store the
complete database of Internet domain
names and their corresponding IP
addresses A widely adopted security protocol
1. Based on the existing malware signatures designed to facilitate privacy and data
Physical units that direct computers to 2. Using heuristics security for communications over the
individual servers in a network based on factors Program used to detect unsolicited, unwanted 3. Based on file length PORTS Internet.

such as server processor utilization, number of and virus-infected emails and prevent those
connections to a server or overall server messages from getting to a user's inbox.
performance.
There are 65,535 TCP and UDP
Secure Copy Protocol (SCP) is a ports on which a computer can SECURE
Internet Small Computer System Interface (iSCSI) is an method based on (Secure Shell) communicate.
SOCKETS
IP-based storage networking standard for linking data INTERNET SMALL SECURE COPY SSH for safely transferring
computer files between a local LAYER
storage facilities. iSCSI is used for faster data transfers COMPUTER SYSTEM PROTOCOL
host and a remote host, or
over intranets and handling remote storage access INTERFACE between two remote hosts.
Secure Sockets Layer (SSL) protocol
mainly in local-area networks (LAN) and WANs.
communications occur between the
TRANSMISSION HTTP (application) and TCP (transport)
IMPLEMENTING CONTROL
layers of Internet communications.

Network Basic Input/Output


NETWORK PROTOCOLS PROTOCOL/INTERNET
System (NetBIOS) is an PROTOCOL
application programming NETBIOS AND SERVICES
interface (API) providing
The core of TCP/IP consists of four
various networking services. FILE TRANSFER
main protocols: the Internet Protocol
PROTOCOL SECURE (IP), the Transmission Control Protocol
(TCP), the User Datagram Protocol
Hypertext Transfer Protocol
(UDP), and the Internet Control
Fibre Channel (FC) is a gigabit Secure (HTTPS) is a protocol
HYPERTEXT TRANSPORT Message Protocol (ICMP).
The Internet Control Message that secures communication
network technology predominantly and data transfer between a PROTOCOL OVER SECURE FTP passes the username and password
FIBRE CHANNEL Protocol (ICMP) is a network layer
used to link data storage facilities or Telnet is a terminal emulation TELNET INTERNET CONTROL user's web browser and a SOCKETS LAYER in a plain-text form, allowing packet
protocol used by network website. sniffing of the network traffic to read
a storage-area network (SAN). program used to access remote MESSAGE PROTOCOL devices to diagnose network these values, which may then be used
routers and UNIX systems. communication issues. for unauthorized access to the server.

You might also like