Network security devices
Network security
devices
1.
Firewall
2.
Network router
3.
Virtual private network gateways
4.
Network access control (NAC)
6.
Spam filter
7.
Anti virus
8.
Secure modems
9.
Intrusion detection system(IDS)
10. Intrusion
prevention system (IPS)
11. Wireless
intrusion prevention and detection system (WIDPS)
12. Unified
threat management (UTM)
1.
Virtual private network gateways
VPN is a programming that creates encrypted
and safe connection over the public internet. It usually used the internet to
connect remote user or sites together. VPN is using protocol tunnel to encrypting
data at the sending and decrypting it at the receiving.
Virtual private network (VPN) tunnel
creates point to point connection so that it cannot be access by unauthorized
person. To create the VPN tunnel is by the device need to run a software
application in the cloud or locally.
Advantages
of VPN
Remote control – Example, your information can
be access from home or office
Sharing file – Example, can be used to share
file to group
2.
Spam filter
It is a program that is created to detect
unwanted or unsolicited email and preventing that message from getting to the
user’s inbox.
Content filter – reviews the content of the
message either it is spam or not
Permission filter – require whoever sending
a message to be approval by the recipient
Advantages of spam filter
1.
It block junk email – Example, spam email that
want to sell something. An email that is being send to thousand or hundred
recipients.
2.
It will stop phishing scams – Example,
activities of stealing personal information
3.
Firewall
A firewall is a network security device
that monitors traffic to or from your network. It allows or blocks traffic
based on a defined set of security rules.
The purpose of firewall in a network is to
eliminate or reducing the unwanted network communication while allowing lawful
communication to freely flow
Advantages of firewall
1.
Reducing risk of keyloggers
2.
Monitoring all traffic entering computer
3.
Block Trojan horse
4.
Keep hackers out from your network
Comments
Post a Comment