Posts

Showing posts from May, 2019

Network security common tools & techniques

NAT -           A NAT (Network Address Translation or Network Address Translator) is the virtualization of Internet Protocol (IP) addresses -           To hide you’re true IP address The purpose of NAT Helps improve security and decrease the number of IP addresses an organization needs. Advantages -           It prevent the depletion of IPV4 addresses -           Allows to use your own private IPv4 addressing system and prevent the internal address changes if you change the service provider. Disadvantages -           NAT (Network Address Translation) may cause delay in IPv4 communication. -           NAT (Network Address Translation) cause loss of end-device to end-device IP traceability Why  organization   need  to implement it? NAT is a very important aspect of firewall security. It conserves the number of public addresses used within an organization, and it allows for stricter control of access to resources on both sides of the firewall. What will

Network security

1. 2 Tools that are used for implementing network security Anti-malware Anti-malware network tools help administrators identify, block and remove malware. They enable the IT department to tailor its anti-malware policies to identify known and unknown malware sources, for example, or surveil specific users and groups. Network access control They handle access authentication and authorization functions and can even control the data that specific users access, based on their ability to recognize users, their devices and their network roles. 2. 2 technique that is used for implementing network security Encryption A password manager that controls access. People within companies cause the most problems. Provide training on how to avoid malware and phishing attacks. The Yahoo breach was due to an employee clicking on a malicious link. Firewall A firewall is a network security device that monitors traffic to or from your network. It allows or blocks traffic based