Here are details of the cybersecurity devices and their technology that will help to protect organization.
Report
Share
Report
Share
1 of 14
More Related Content
Cybersecurity Devices and Technologies.pptx
1. There is no single security appliance or
piece of technology that will solve all the
network security needs in an organization.
We must consider what tools will be most
effective as part of our security system.
@anantakhare Ananta_khare Anantakhare Anantakhare
2. Security appliances can be stand alone
devices like a router or software tools that are
run on network device.
They fall into six general categories.
@anantakhare Ananta_khare Anantakhare Anantakhare
3. While routers are primarily used to
interconnect various network segments
together, they usually also provide basic
traffic filtering capabilities.
This information can help define which
computers from a given network segments
can communicate with which network
segments.
@anantakhare Ananta_khare Anantakhare Anantakhare
4. Firewalls can look deeper into the network
traffic itself and identify malicious behavio
that has to be blocked.
Firewalls can have sophisticated security
policies applied to the traffic that is passing
through them.
@anantakhare Ananta_khare Anantakhare Anantakhare
5. IPS systems use a set of traffic signatures that
match and block malicious traffic and attacks
@anantakhare Ananta_khare Anantakhare Anantakhare
6. VPN systems let remote employees use a
secure encrypted tunnel from their mobile
computer and securely connect back to
organization’s network.
VPN systems can also securely interconnect
branch offices with the central office network.
@anantakhare Ananta_khare Anantakhare Anantakhare
7. These systems use signatures or behavioral
analysis of applications to identify and block
malicious code from being executed
@anantakhare Ananta_khare Anantakhare Anantakhare
8. Other security devices include web and email
security appliance, decryption devices, client
access control servers and security
management systems.
@anantakhare Ananta_khare Anantakhare Anantakhare
9. In computer networking, a firewalls is designed
to control or filter which communication are
allowed out of device or network. A firewalls can
be installed on a single computer (host-based
firewall) or it can be standalone network device
that protects an entire network of computers and
all of the host devices on that network(network-
based firewall)
A computer and network attacks have become
more sophisticated, new types of firewalls have
developed, which serve different purpose
@anantakhare Ananta_khare Anantakhare Anantakhare
11. 1.Network layer firewall
This filters communications based on
source and destination IP addresses
2.Transport layer firewall
Filters communications based on
source and destination data ports as well as
connection states
3.Application layer firewall
Filters communications based on an
application, program or service.
@anantakhare Ananta_khare Anantakhare Anantakhare
12. 4.Context aware layer firewall
Filter communications based on the
user, device, role, application type and
threat profile.
5. Proxy serer
Filters web content request like
URL’s, domain names and media types.
6.Reverse proxy server
Placed in front of web servers
reveres proxy servers protect, hide, offload
and distribute access to web server.
@anantakhare Ananta_khare Anantakhare Anantakhare
13. 7.Network address translation (NAT) firewall
This firewall hides or masquerades the
private address of network hosts.
8.Host-based firewall
Filters port and system services calls
on single computer operating system.
@anantakhare Ananta_khare Anantakhare Anantakhare