0% found this document useful (0 votes)
76 views5 pages

Network Security Tools and Tip Notes

The document summarizes 14 different network security tools and techniques: access control, anti-malware software, anomaly detection, application security, data loss prevention, email security, endpoint security, firewalls, intrusion prevention systems, network segmentation, security information and event management, virtual private networks, web security, and wireless security. It then provides details on dealing with email spam, internet mobile security including how to tell if a phone is tapped and how to remove spyware, and general internet safety tips such as using internet security software and an ad blocker.

Uploaded by

NM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views5 pages

Network Security Tools and Tip Notes

The document summarizes 14 different network security tools and techniques: access control, anti-malware software, anomaly detection, application security, data loss prevention, email security, endpoint security, firewalls, intrusion prevention systems, network segmentation, security information and event management, virtual private networks, web security, and wireless security. It then provides details on dealing with email spam, internet mobile security including how to tell if a phone is tapped and how to remove spyware, and general internet safety tips such as using internet security software and an ad blocker.

Uploaded by

NM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

There are 14 different network security tools and techniques

1. Access control

If threat actors can’t access your network, the amount of damage they’ll be able to do
will be extremely limited. But in addition to preventing unauthorized access, be aware
that even authorized users can also be potential threats. Access control allows you to
increase your network security by limiting user access and resources to only the parts
of the network that directly apply to individual users’ responsibilities.
2. Anti-malware software

Malware, in the form of viruses, trojans, worms, keyloggers, spyware, etc. are designed
to spread through computer systems and infect networks. Anti-malware tools are a kind
of network security software designed to identify dangerous programs and prevent them
from spreading. Anti-malware and antivirus software may also be able to help resolve
malware infections, minimizing the damage to the network.
3. Anomaly detection

It can be difficult to identify anomalies in your network without a baseline


understanding of how that network should be operating. Network anomaly detection
engines (ADE) allow you to analyze your network, so that when breaches occur, you’ll
be alerted to them quickly enough to be able to respond.
4. Application security

For many attackers, applications are a defensive vulnerability that can be exploited.
Application security helps establish security parameters for any applications that may
be relevant to your network security.

5. Data loss prevention (DLP)

Often, the weakest link in network security is the human element. DLP technologies
and policies help protect staff and other users from misusing and possibly
compromising sensitive data or allowing said data out of the network.
6. Email security

As with DLP, email security is focused on shoring up human-related security


weaknesses. Via phishing strategies (which are often very complex and convincing),
attackers persuade email recipients to share sensitive information via desktop or mobile
device, or inadvertently download malware into the targeted network. Email security
helps identify dangerous emails and can also be used to block attacks and prevent the
sharing of vital data.

7. Endpoint security

The business world is becoming increasingly bring your own device (BYOD), to the point
where the distinction between personal and business computer devices is almost
nonexistent. Unfortunately, sometimes the personal devices become targets when users
rely on them to access business networks. Endpoint security adds a layer of defense
between remote devices and business networks.
8. Firewalls

Firewalls function much like gates that can be used to secure the borders between your
network and the internet. Firewalls are used to manage network traffic, allowing
authorized traffic through while blocking access to non-authorized traffic.

9. Intrusion prevention systems

Intrusion prevention systems (also called intrusion detection) constantly scan and
analyze network traffic/packets, so that different types of attacks can be identified and
responded to quickly. These systems often keep a database of known attack methods,
so as to be able to recognize threats immediately.
10. Network segmentation

There are many kinds of network traffic, each associated with different security risks.
Network segmentation allows you to grant the right access to the right traffic, while
restricting traffic from suspicious sources.
11. Security information and event management (SIEM)

Sometimes simply pulling together the right information from so many different tools
and resources can be prohibitively difficult — particularly when time is an issue. SIEM
tools and software give responders the data they need to act quickly.
12. Virtual private network (VPN)

VPN tools are used to authenticate communication between secure networks and an
endpoint device. Remote-access VPNs generally use IPsec or Secure Sockets Layer (SSL)
for authentication, creating an encrypted line to block other parties from eavesdropping.

13. Web security

Including tools, hardware, policies and more, web security is a blanket term to describe
the network security measures businesses take to ensure safe web use when connected
to an internal network. This helps prevent web-based threats from using browsers as
access points to get into the network.
14. Wireless security

Generally speaking, wireless networks are less secure than traditional networks. Thus,
strict wireless security measures are necessary to ensure that threat actors aren’t
gaining access.
A. How to deal with email spam?

Spam emails – also known as junk emails – are unsolicited messages sent out in bulk.
Most email providers use algorithms to filter out spam messages, but they can still
appear in your inbox despite this. Steps to take include:
a. Mark spam emails as spam – this will help the email provider to refine their
spam filtering. How to mark a message as spam will vary depending on which
email client you use – Outlook, Gmail, Apple Mail, Yahoo Mail, and so on.
b. Never click on a link or open an attachment in a spam email. Doing so could
mean you download malware onto your device. At the very least, you confirm to
the spammers that yours is an active email account, incentivizing them to send
more spam.
c. Be careful about where you disclose your email address. It's a good idea to
have a secondary, throwaway email account that you use solely for email sign-
ups and subscriptions, separate from the one you use for friends and family and
separate from the one you use for work.
d. Most email providers will offer privacy settings – review these and make sure
they are set to a level you feel comfortable with.
e. Look into third-party email spam filters. These provide an additional layer of
cyber security, as emails have to travel through two spam filters before getting to
you – your email provider’s spam filter plus the third-party app.

B. Internet mobile security


Mobile security refers to the techniques used to secure data on mobile devices such as
smartphones and tablets and is another aspect of internet protection.
a. How to tell if your phone is tapped?
Your smartphone can be vulnerable to tapping, especially if it has been jail broken or
rooted. Phone tapping can allow third parties to listen to your calls or read messages. If
you’re concerned your phone may have been hacked, you can look out for signs like
unusual background noise on calls, your phone’s battery depleting faster than usual,
or behaving in strange ways.
If your phone seems to be turning itself on or off without your input, or if apps appear
that you don’t remember installing yourself, that could indicate that somebody else has
access to your phone. Receiving strange SMS messages, containing a garbled series of
letters and numbers, or getting a higher than usual phone bill could also indicate phone
tapping.
b. What is phone spoofing, and how can you stop it?

Spoofing generally involves cybercriminals trying to convince you that information is


coming from a trusted source. Phone spoofing is when scammers deliberately falsify the
information which appears on your caller ID to disguise their identity. They do this so
that victims think an incoming call is coming from their local area or a number they
recognize.

To stop phone spoofing, check to see if your phone carrier has a service or app that
helps identify and prevent spam calls. You can also look into third-party apps such as
RoboKiller or Nomorobo to help you screen calls – but be aware that these apps require
you to share private data with them.
Often, if you receive a call from an unknown number, the best thing to do is not answer
it. Answering scam calls is a bad idea because the scammers then perceive you as a
potential target.
c. How to remove spy software from your phone?

If you’re seeing signs that your smartphone has spyware, look at the apps installed on
your device. Remove anything that you are unsure of, or don’t remember installing.

Updating your phone’s operating system can help, as can more extreme measures such
as resetting your phone to factory settings. While this might be inconvenient, it can be
well worth doing if you’re concerned that your phone security has been compromised.
d. Internet safety tips: How to protect yourself online

So, what are the best internet protection methods? Follow these best practices to
protect yourself from internet security threats and different types of internet attacks:
You need internet security software that protects you round the clock
The best internet security software will protect you from a range of internet security
threats, including hacking, viruses, and malware. A comprehensive internet security
product should be able to locate device vulnerabilities, block cyber threats before they
take hold, and isolate and remove immediate dangers.
e. Block webcam access, so your internet privacy is assured
Webcam hacking is when hackers access your mobile and computer cameras and record
you. This internet security threat is known as “confecting”. The number of recorded
attacks is relatively low, although most occur without the victim ever realizing they have
been compromised, which means they go unaccounted for.
One way to block webcam access is by using duct tape – but in a world where many
people use video conferencing every day for work or keeping in touch, it’s not feasible to
do this. A much better prevention method is to use an antivirus solution that offers
webcam. It’s also a good idea to turn your desktop or laptop computer off when not in
use.
f. An ad-blocker can protect you from malvertising
Ad blockers clear web pages of ads – and by blocking ads from displaying, you remove
the risk of seeing and clicking on an ad that may be harmful. Ad blockers also have
other benefits. For example, they may reduce the number of cookies stored on your
machine, increase your internet privacy by reducing tracking, save bandwidth, help
pages load faster, and prolong battery life on mobile devices.
Some ad blockers are free, while others cost money. Bear in mind that not all ad
blockers block every online ad, and some websites may not run properly if you have the
ad blocker turned on. You can, however, enable ad blockers to allow online ads from
specific websites.
g. Take care of the whole family with parental controls
Parental controls refer to the settings that enable you to control what content your child
can see on the internet. Parent controls, used in conjunction with privacy settings, can
help increase internet security for kids. Setting up parental controls varies by platform
and device.
h. PC cleaner
A PC cleaner is a tool that removes unnecessary and temporary files and programs from
your system.
i. Cross-platform protection

Internet protection these days needs to cover all the devices we use to go online –
laptops, desktops, smartphones, and tablets. The best internet security software will
allow you to install the antivirus program on multiple devices, giving you cross-platform
protection from internet security threats.
j. Safe online banking and online shopping

Make sure you’re transacting with a secure website – the URL should start with https://
rather than http:// - the “s” stands for “secure” and indicates that the site has a security
certificate. There should also be a padlock icon to the left of the address bar.
Check the URL carefully – criminals can create fake websites with URLs that are similar
to legitimate ones. They often change one or two letters in the URL to deceive people.
Avoid submitting financial information when using public Wi-Fi.
Online banking security tips include:

1. Again, avoid submitting financial or personal information when using public


Wi-Fi.
2. Use strong passwords and change them regularly.
3. Use multifactor authentication where possible.
4. Type your bank URL or use your banking app directly, instead of clicking on
links in emails – to avoid falling victim to a phishing scam.
5. Check bank statements regularly to identify any transactions you don’t
recognize.
6. Keep your operating system, browser, and applications up to date. This will
ensure that any known vulnerabilities are patched.

You might also like