CONTENTS: INTRODUCTION TYPES OF NETWORK SECURITY ADVANTAGES DISADVANTAGES CONCLUSION
INTRODUCTION: Network security consists of the polices, procesess and practices adopted to prevent, detect and monitor access, misuse , modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator . Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.
TYPES: 1. Firewall Firewalls filter the traffic on your network. They work to prevent and block unauthorized internet traffic. 2. Network Segmentation Network segmentation divides a network into multiple sections, and each section then acts as their own individual networks 3. Access Control Access control gives you the ability to grant or deny access to individual users based on their responsibilities within your network. 4. Remote Access VPN A remote access virtual private network (VPN) provides integrity and privacy of information by utilizing endpoint compliance scanning, multi-factor authentication (MFA) , and transmitted data encryption .
TYPES: 5. Zero-Trust Network Access (ZTNA) The Zero Trust Network grants specific access to an individual user based on the exact role they play within the network. 6. Email Security Email security is set up to prevent users from unknowingly providing sensitive information or allowing access to the network via a malware-infected email. 7. Data Loss Prevention (DLP) DLP is a network security technology that aids in preventing sensitive information from accidentally being leaked outside of the network by users.
ADVANTAGES: Protects against cyber attacks Access levels Keep your data safe Updates are now centralized Centrally managed
Disadvantages : Setup is expensive It takes time Incompetent administration
CONCLUSION: Internet connectivity, email and the web, now vital for small business, pose many risks to computer system and the privacy of the company’s data. The onslaught of viruses, worms compounded with the increasing problem of spyware, adware, and blended threats continue to attack an organization’s network through multiple methods.