Understanding Security Terminology In Network Security
Security Professionals have specific terminology that they use when it comes to network security. Individual or system administrators are probably already familiar with most of these terms. Although most hacking terminologies describes the activities of the person performing. In this article, I want to show you some security terminology in network security. Follow me as we look at this together in this article.
The first and most basic security device is the Firewall. A firewall is a barrier between a network and the outside world. Sometimes, they are called a stand-alone server, sometimes a router, sometimes software running on a machine.
Whether it is a physical form, the purpose is the same: to filter traffic entering and exiting a network. Firewalls are related to, and often used in conjunction with, a proxy server. A proxy server hides your internal network IP address and presents a single IP address to the outside world.
Firewalls and proxy servers are added to networks to provide basic perimeter security. They filter incoming and outgoing network traffics but do not affect traffic on the network. Sometimes. these devices are augmented by an Intrusion Detection System (IDS). An IDS monitors traffic looking for suspicious activity that might indicate an attempted intrusion.
Access control is another important security terminology in network security. It is the aggregate of all measures taken to limit access to resources on a network. This might include logon procedure, encryption and any method that is designed to prevent unauthorised personnel from accessing a resource.
Authentication is clearly a subset of access control, perhaps the most basic security activity on a network.
Authentication is simply the process of determining whether the credentials given by a user or another system such as a username and a password are authorised to access a network that has the resources in question.
When a user logs in with a username and a password, the system attempts to authenticate that login details. If they are successfully authenticated, the user will be given access.
Non-repudiation is another term in network security. it is used to ensure that someone performing an action cannot deny that they performed that action. It also keeps a clear record of actions that a user performed on a network at a given time.
There are various system logs that keep records of actions that are performed by users. One of this method is auditing. Auditing is the process of reviewing logs, records and procedures to determine whether they meet up with standards or not.
Least privilege is a concept you should keep in mind when granting access to devices. It states that you should only be granted the least or only privileges that people needed to perform their tasks.
You also have to keep the concept of the CIA in mind. That has to do with Confidentiality, Integrity and Availability. All security measures should affect one of these areas.
Take, for instance, encryption can help to protect the confidentiality of devices and documents. A digital signature can guarantee the integrity of documents and a good backup can ensure that services are always available.
Now your take on this argument.
We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.
You can also like our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.
You can also become part of our WhatsApp Group Here.
Enter your email address to get updates when we post our next article. you have to click on the link in the email sent to you to confirm your subscription. If you have been receiving our email updates and it is no longer active, please subscribe again.:
Delivered by FeedBurner
77 total views, 1 views today