Section A
Section A
Firewalls
• Purpose:
Firewalls act as a security barrier that monitors and controls incoming and outgoing network
traffic based on predetermined security rules. They prevent unauthorized access while
allowing legitimate communication.
• Types of Firewalls:
• Definition:
VPNs create a secure, encrypted tunnel for data transmission over public networks, ensuring
confidentiality and integrity.
VPNs use encryption protocols like IPsec or SSL/TLS to secure data, making it unreadable
to attackers intercepting the communication.
• A firewall ensures only legitimate traffic reaches the internal network, while a
VPN secures data transmission over untrusted networks. Together, they provide robust
security by preventing unauthorized access and encrypting sensitive data.
Role of IDS
• IDS are designed to detect and alert administrators of malicious activity, policy
violations, or security breaches on a network or host.
Types of IDS
• Network-Based IDS (NIDS):
Monitors traffic across an entire network and detects malicious activity using packet analysis.
Example: Snort.
Runs on individual devices to monitor file changes, system logs, and processes.
Example: OSSEC.
• Intrusion Detection Systems (IDS): Identify threats and send alerts but do not
actively block malicious activities.
Detection Methods
• Signature-Based Detection:
Relies on predefined attack patterns or signatures. It is effective for known threats but
cannot detect new attacks.
• Anomaly-Based Detection:
Identifies deviations from normal behavior. It is effective against zero-day attacks but prone
to false positives.