Network security
Network security consists of the
Network security concept
Network security starts with
Once authenticated, a
Communication between two hosts using a network may be encrypted to maintain security and privacy.
Previous research on network security was mostly about using tools to secure transactions and information flow, and how well users knew about and used these tools. However, more recently, the discussion has expanded to consider information security in the broader context of the digital economy and society. This indicates that it's not just about individual users and tools; it's also about the larger culture of information security in our digital world.[8]
Security management
Security management for networks is different for all kinds of situations. A home or small office may only require basic security while large businesses may require high-maintenance and advanced software and hardware to prevent malicious attacks from
Types of attack
Networks are subject to
Types of attacks include:[10]
- Passive
- Network
- Wiretapping
- Passive Port scanner
- Idle scan
- Encryption
- Traffic analysis
- Network
- Active:
- Virus
- Eavesdropping
- Data modification
- Denial-of-service attack
- Active Port scanner
- DNS spoofing
- Man in the middle
- ARP poisoning
- VLAN hopping
- Smurf attack
- Buffer overflow
- Heap overflow
- Format string attack
- SQL injection
- Phishing
- Cross-site scripting
- CSRF
- Cyber-attack
See also
- Cloud computing security
- Computer security
- Crimeware
- IT security standards
- Data loss prevention software
- Greynet
- Identity-based security
- Metasploit Project
- Mobile security
- Network enclave
- Network Security Toolkit
- TCP Gender Changer
- TCP sequence prediction attack
- List of security hacking incidents
- Wireless security
- Dynamic secrets
- Low Orbit Ion Cannon
- High Orbit Ion Cannon
- Gordon–Loeb model for cyber security investments
References
- ^ "What is Network Security? Poda myre". Forcepoint. 2018-08-09. Retrieved 2020-12-05.
- ^ A Role-Based Trusted Network Provides Pervasive Security and Compliance - interview with Jayshree Ullal, senior VP of Cisco
- .
- ^ Dave Dittrich, Network monitoring/Intrusion Detection Systems (IDS) Archived 2006-08-27 at the Wayback Machine, University of Washington.
- ^ "Dark Reading: Automating Breach Detection For The Way Security Professionals Think". October 1, 2015.
- ^ "What is a honeypot? How it protects against cyber attacks". SearchSecurity. Retrieved 2021-03-04.
- ^ "Honeypots, Honeynets". Honeypots.net. 2007-05-26. Retrieved 2011-12-09.
- PMID 36883131.
- ^ Wright, Joe; Jim Harmening (2009) "15" Computer and Information Security Handbook Morgan Kaufmann Publications Elsevier Inc p. 257
- ^ "BIG-IP logout page" (PDF). Cnss.gov. 1970-01-01. Archived from the original (PDF) on 2012-02-27. Retrieved 2018-09-24.
Further reading
- Case Study: Network Clarity Archived 2016-05-27 at the Wayback Machine, SC Magazine 2014
- Cisco. (2011). What is network security?. Retrieved from cisco.com Archived 2016-04-14 at the Wayback Machine
- Security of the Internet (The Froehlich/Kent Encyclopedia of Telecommunications vol. 15. Marcel Dekker, New York, 1997, pp. 231–255.)
- Introduction to Network Security Archived 2014-12-02 at the Wayback Machine, Matt Curtin, 1997.
- Security Monitoring with Cisco Security MARS, Gary Halleen/Greg Kellogg, Cisco Press, Jul. 6, 2007. ISBN 1587052709
- Self-Defending Networks: The Next Generation of Network Security, Duane DeCapite, Cisco Press, Sep. 8, 2006. ISBN 1587052539
- Security Threat Mitigation and Response: Understanding CS-MARS, Dale Tesch/Greg Abelar, Cisco Press, Sep. 26, 2006. ISBN 1587052601
- Securing Your Business with Cisco ASA and PIX Firewalls, Greg Abelar, Cisco Press, May 27, 2005. ISBN 1587052148
- Deploying Zone-Based Firewalls, Ivan Pepelnjak, Cisco Press, Oct. 5, 2006. ISBN 1587053101
- Network Security: PRIVATE Communication in a PUBLIC World, Charlie Kaufman | Radia Perlman | Mike Speciner, Prentice-Hall, 2002. ISBN 9780137155880
- Network Infrastructure Security, Angus Wong and Alan Yeung, Springer, 2009. ISBN 978-1-4419-0165-1