- Identify the network assets (hardware, software, employee)
- Analyze the security risks (hackers)
- Analyze the security requirements (backup)
- Develop a security plan (plan if any of the security risk happen)
- Define a security policy (rules of the security, example do not change the settings of the computer)
- Develop the procedure for applying the security policies
- Develop a technical implementation strategy
- Train the users, managers, and technical staff
- Implement the technical strategy and security procedures
- Test the security and update it if any problems are found
- Maintain security
The different types of network security designs that will aid good network security
Antivirus and Anti malware Software
Antivirus and Anti malware Software
- Both of these, antivirus and anti malware can only detect viruses or malware, and then it will removes the threat and fixes the damage.
Application Security
- It is the software to secure the loopholes of our application from the perpetrators.
- It tracks the procedure of finding our application's vulnerabilities, after then it fixes and preventing them from any cyber attack.
- Uses software, hardware, and processes to keep the assets intact.
Data Loss Prevention (DLP)
- It is a technology, responsible to secure the communication network of an organization.
- To protect the sensitive data.
- Nowadays, employees in an organization are prohibited to upload, forward, or print critical information in an unprotected manner.
Email Security
- Popular medium to spread threats such as the malware, spams, and phishing attack.
- Social engineering methodologies make these threats appear genuine and sophisticated.
- Email application security is used to secure the access and the data of an email account by blocking the incoming attacks and controls the outbound messages.
Firewalls
- Monitor the incoming and outgoing traffic that are based on a set of predefined rules
- Is a barrier that separates the trusted networks from the untrusted.
- Can be a hardware or a software.
Network Access Control (NAC)
- Strengthen the network by controlling its access,
- By blocking the non compliant endpoint devices, it can save the network from any potential security breaches.
Wireless Security
- It is become another channel for security breaches.
- With wireless security makes it very challenging for any of the unauthorized access to the damage of the data that is stored in any devices.
References:
No comments:
Post a Comment