What Are The Types Of Network Security

Network, transport, and host-based security

Effective network security layer authentication requires knowledge of both internal and external factors. This includes things like passwords, personal information (including social securitization data), hardware profiles, location anonymity, IP addresses, etc.
It also requires understanding how to prevent attacks that attempt to exploit vulnerabilities in your system.
A fundamental principle of good design is to avoid open doors/windows; this applies to servers just as much as it does to buildings or people. Also look for apps that have undocumented features and that have access to sensitive information; make sure these are not updated with long, random delay times.
Look at your browser’s address bar; do you have any pages that aren’t yours? Any popups? Any banners? Anything that requests information from you such as cookies or ID numbers? [substeps] These can all be symptoms of malware.
Final note: keep your software up to date; install only free and safe desktop apps; don’t run anything you find online without reading about it first. Your safety depends upon your awareness of what is going on around you.
Authentication, authorization, and encryption
For your network to be secure, all three of these things need to work effectively.
Authentication is the process used to confirm that someone who wants access to your data (your username and password or other authentication code) is actually who they claim to be.
Authorization refers to whether or not you have permission to do something on another’s computer. Clicking “Allow” when asked for authentication prevents hackers from accessing your information if you are not logged in automatically.
Encryption is protecting your data by converting it into codes that can only be read by those with the correct key. Though dramatically increasing security, encryption also slows down computers significantly. As such, most people choose to encrypt documents but leave the system itself unencrypted.
Defense in depth

“Defense in depth” is an architectural term that refers to adding multiple layers of protection for data assets, servers, or physical facilities. Essentially, it means putting several barriers in place before being able again to access your asset. When thinking about security, sometimes called information security, you should consider how targeted an attacker would be and what their attack surface (the part of the network they can reach) is. Then you can come up with a layered approach to security.
There are many ways to achieve defense in depth, but here are some basic steps you can take to improve security:
Put password policies into effect; require passwords to have a minimum length, use alphanumeric characters, and change passwords periodically. Also put new users through mandatory training on security measures then enforce these rules thoroughly.
Develop strong administrator accounts and make sure they’re not defaulted to when people get hired, go out, etc. Make it hard to become root by requiring passwords or special packages. Put restrictions on who can run specific commands.
If we talk about vulnerabilities, make sure that there aren’t any open ports or dependencies that lead to outside attacks. If we start talking about intrusion prevention systems, stop everything you’re doing and think about what kinds of activities could happen at this stage.
Intelligence-driven policing

Network security technology has improved law enforcement’s ability to access digital evidence and thwart cyber crime. But as this article points out, there are still some things law enforcement can’t do, like they can’t search through data without first getting permission or going before a judge.
And encryption is a major pain in everyone’s ass – including investigators’. Encryption essentially prevents anyone from reading your email messages and files, which is why police need a court order to get into someone’s mailbox.
Some people are talking about eliminating encryption, but I doubt that would be acceptable to criminals.
Intrusion detection

Generally speaking, there are two types of network security scanners; signature-based and protocol analyzers.
Signature-based scanners rely on signatures that define known viruses or malicious programs. These signatures can be updated automatically by servers to detect new threats.
Protocol analyzers operate in a similar way, looking at traffic flowing through a device such as a router. However, they do not use patterns defined by humans – instead, they examine how communications flow through the interface.
Human experts look for patterns in the data that is being exchanged over the network security. They then create signs where none exist before, creating a pattern.
This process, called ‘signature creation’, is done by computers, which reduce human intervention to its most basic form. It alerts workers that something changed about which people were unaware previously. Protocol analysis deals with what each part of the communication sees (observes) and does, while intrusion detection focuses more on what intrusions are doing (behaving).
Programs designed to protect networks from damage caused by malware introduce their own challenges. Preventing infections from entering the network via email is easy – just don’t open the attachment! Protecting the network once it’s infected is harder. Most organizations have trouble enforcing bans on internet usage in particular places, let alone tracking who uses the computer after someone has logged in.
Network services provide ways to observe and control aspects of network activity
Anonymous surfing

When you surf the Internet anonymously, your identity is unknown to the websites that you visit. Your personal information is not listed in any directory so they cannot directly contact you.
However, it is still possible for others to find out what website you are visiting by checking your IP address. A proxy server is used to block your identification data from reaching the site you are viewing.
This means that if someone else has access to your IP address, they can see which site you are connecting to. To avoid this happening, use an anonymous browser such as Firefox or Chrome.
These browsers will start up with a random ID number written in the name of their file (firefox/chrome). The actual version of the browser without a name is called firefox _. idp dot net is a valid URL to load in these browsers.
You also have the ability to delete existing cookies and temporary files, thereby requiring you to enter your login details on each page. However, changing between types of browsing experience is dependent upon whether or not you log in again after having cleared your history.
Cloud security

More and more companies are turning to cloud computing for ease of access and reliability. However, this comes with added difficulty in determining what levels of security are necessary.
It is not possible to achieve complete security through the cloud. Even if you were to outsource your information technology (IT) systems environment to some other company, you would still need to ensure that all of your own data was adequately protected.
You also have no control over how secure or reliable their servers are as they are outside of your network. People can use them however they want including installing backdoors if they think it will make their work easier.
For these reasons and more, it is impossible to completely rely on the cloud. Your data is still offline and cannot be accessed by someone who does not have permission.