Monday, October 21, 2019

Network Security - Devices

Discuss the different types of network security devices
Explain how they are used to provide network security
Explain their advantages
Provide diagrams on how each device is used with justifications

Secure modem

  • To transmit the signals that are digital over analog telephone lines
  • The digital signals are converted into analog signals with different frequencies and then transmitted to the modem at the receiving locations. The receiving modem will reverse the transformation and will provide the digital output to the connected device to the mode, (computer)
  • There are many telephone companies offer DSL services and many computers cable use modems as their end terminals for the use of identification and recognition of home and personal users
Advantage for wireless modem:
  1. The internet connection is always on 
  2. The modem provide fast internet connection
  3. Offer a secure network with the flexibility and convenience of a wireless internet connection


Intrusion Prevention System (IPS)

  • It is a form of the network security to prevent any identified threats. This IPS is monitoring the network continuously, this is to look for any possible malicious incidents in the network
  • It is a network security prevention technology that will examine the traffic flows in the network and any vulnerability exploits, which usually comes in the form of malicious inputs to a service where the attackers use to interrupt and gain access to the application.
  • IPS does scanning the network traffic as it will go across the network, this is to prevent from malicious events from happening. 
  • This IPS will be sitting between your firewall and the other of your network to stop the malicious traffic from entering the network. Same concept for security guard. When any of the unknown event is detected, the packet will then be rejected.



Advantages/Benefits:
  • Less security incidents
While the connected devices does not notice any changes, this IPS is making sure the disruption is less for the systems and reducing the numbers of security incidents
  • Selective Logging
It only records the network activity if there is any action, maintaining the privacy of the network users
  • Privacy Protection
An IPS is also protecting the privacy of the information that are available in the network


Wireless Intrusion Prevention and Detection System (WIDPS)

  • Used to protect any wireless network or in any other cases a wired network, from any unauthorized users (WIPS)
  • System sensors used in order to monitor the network in case if there is any intrusion of any unauthorized devices (WIDS)

References

Blog.netwrix.com. (2019). Network Devices Explained. [online] Available at: https://blog.netwrix.com/2019/01/08/network-devices-explained/ [Accessed 18 Oct. 2019].


Forcepoint. (2019). What is an Intrusion Prevention System (IPS)?. [online] Available at: https://www.forcepoint.com/cyber-edu/intrusion-prevention-system-ips [Accessed 16 Oct. 2019].


Paloaltonetworks.com. (2019). What is an Intrusion Prevention System? - Palo Alto Networks. [online] Available at: https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips [Accessed 16 Oct. 2019].


Wilkins, S. (2019). Basic Intrusion Prevention System (IPS) Concepts and Configuration > Basic Intrusion Prevention System (IPS) Concepts and Configuration. [online] Ciscopress.com. Available at: http://www.ciscopress.com/articles/article.asp?p=1722559 [Accessed 16 Oct. 2019].


Lewis, T. (2019). IDS and IPS 101: How Each System Works and Why You Need Them. [online] LBMC Family of Companies. Available at: https://www.lbmc.com/blog/ids-and-ips-101/ [Accessed 16 Oct. 2019].


Its.umich.edu. (2019). Intrusion Prevention System Benefits / U-M Information and Technology Services. [online] Available at: https://its.umich.edu/enterprise/wifi-networks/network-security/ips/benefits [Accessed 18 Oct. 2019].


Reuters.com. (2019). Wireless Intrusion Detection and Prevention Systems (WIPDS) Market – Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2018 – 2025 - Reuters. [online] Available at: https://www.reuters.com/brandfeatures/venture-capital/article?id=50395 [Accessed 22 Oct. 2019].



No comments:

Post a Comment

CRP - Key Considerations for Research

Determine the key considerations are for planning and undertaking research Issues that can be encountered in research  poor time mana...