Understanding Security Terminology In Network Security

Understanding Security Terminology In Network Security

 

Security Professionals have specific terminology that they use when it comes to network security. Individual or system administrators are probably already familiar with most of these terms. Although most hacking terminologies describes the activities of the person performing. In this article, I want to show you some security terminology in network security. Follow me as we look at this together in this article. 

 

The first and most basic security device is the Firewall. A firewall is a barrier between a network and the outside world. Sometimes, they are called a stand-alone server, sometimes a router, sometimes software running on a machine. 

Security Terminology In Network Security

Whether it is a physical form, the purpose is the same: to filter traffic entering and exiting a network. Firewalls are related to, and often used in conjunction with, a proxy server. A proxy server hides your internal network IP address and presents a single IP address to the outside world. 

 

Firewalls and proxy servers are added to networks to provide basic perimeter security. They filter incoming and outgoing network traffics but do not affect traffic on the network. Sometimes. these devices are augmented by an Intrusion Detection System (IDS). An IDS monitors traffic looking for suspicious activity that might indicate an attempted intrusion.

 

YOU CAN ALSO READ  10 Email Security Procedures for Safety

Access control is another important security terminology in network security. It is the aggregate of all measures taken to limit access to resources on a network. This might include logon procedure, encryption and any method that is designed to prevent unauthorised personnel from accessing a resource.

 

Authentication is clearly a subset of access control, perhaps the most basic security activity on a network.

 

Authentication is simply the process of determining whether the credentials given by a user or another system such as a username and a password are authorised to access a network that has the resources in question.

 

When a user logs in with a username and a password, the system attempts to authenticate that login details. If they are successfully authenticated, the user will be given access.

 

Non-repudiation is another term in network security. it is used to ensure that someone performing an action cannot deny that they performed that action. It also keeps a clear record of actions that a user performed on a network at a given time. 

 

YOU CAN ALSO READ  Online Safety Tips For Online Users

There are various system logs that keep records of actions that are performed by users. One of this method is auditing. Auditing is the process of reviewing logs, records and procedures to determine whether they meet up with standards or not. 

 

Least privilege is a concept you should keep in mind when granting access to devices. It states that you should only be granted the least or only privileges that people needed to perform their tasks.

You also have to keep the concept of the CIA in mind. That has to do with Confidentiality, Integrity and Availability. All security measures should affect one of these areas.

Take, for instance, encryption can help to protect the confidentiality of devices and documents. A digital signature can guarantee the integrity of documents and a good backup can ensure that services are always available. 

 

YOU CAN ALSO READ  Understanding Session Hijacking In Network Security

 

Now your take on this argument.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.

You can also like our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.

 

You can also become part of our WhatsApp Group Here.

 

Enter your email address to get updates when we post our next article. you have to click on the link in the email sent to you to confirm your subscription. If you have been receiving our email updates and it is no longer active, please subscribe again.:

Delivered by FeedBurner

 77 total views,  1 views today

Adeniyi Salau

Adeniyi Salau Scrum Master Certified , CCNA R&S , BeingCert and Scrum Certified Digital Marketing Professional, CEP, MOS, MCP, CSCU (Project 2016), Microsoft Certified Security and Networking Associate is a Google and Beingcert Certified Digital Marketer, Project Manager and SEO Expert of repute with about a decade of Blogging and online marketing experience. He is always ready to share his experience with others.

Write a Comment

Your email address will not be published. Required fields are marked *

CommentLuv badge
%d bloggers like this: