Network security devices


Network security devices
1.    Firewall
2.    Network router
3.    Virtual private network gateways
4.    Network access control (NAC)
5.    Proxy server
6.    Spam filter
7.    Anti virus
8.    Secure modems
9.    Intrusion detection system(IDS)
10.  Intrusion prevention system (IPS)
11.  Wireless intrusion prevention and detection system (WIDPS)
12.  Unified threat management (UTM)

Explain 3
1.    Virtual private network gateways
VPN is a programming that creates encrypted and safe connection over the public internet. It usually used the internet to connect remote user or sites together.  VPN is using protocol tunnel to encrypting data at the sending and decrypting it at the receiving.

Virtual private network (VPN) tunnel creates point to point connection so that it cannot be access by unauthorized person. To create the VPN tunnel is by the device need to run a software application in the cloud or locally.

Advantages of VPN

    Remote control – Example, your information can be access from home or office
    Sharing file – Example, can be used to share file to group


Image result for vpn file sharing






2.    Spam filter

It is a program that is created to detect unwanted or unsolicited email and preventing that message from getting to the user’s inbox.

Spam filter used to provide network security has several types

Content filter – reviews the content of the message either it is spam or not
Permission filter – require whoever sending a message to be approval by the recipient

Advantages of spam filter
1.    It block junk email – Example, spam email that want to sell something. An email that is being send to thousand or hundred recipients.
2.    It will stop phishing scams – Example, activities of stealing personal information




Image result for spam filter




3.    Firewall
A firewall is a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.

The purpose of firewall in a network is to eliminate or reducing the unwanted network communication while allowing lawful communication to freely flow

Advantages of firewall
1.    Reducing risk of keyloggers
2.    Monitoring all traffic entering computer
3.    Block Trojan horse
4.    Keep hackers out from your network


Image result for firewall






Comments

Popular posts from this blog

Log Review

Organizational security types

Network planning - Proof of concept