- Discuss the different types of network security devices.
- Explain how they are used to provide network security.
- Explain their advantages.
- Provide diagrams on how each devices is used with justifications.
Virtual Private Network Gateways
- A Virtual Private Network (VPN) Gateway is a networking devices that connects two or more devices or shared networks within the VPN infrastructure. It is designed as a connection or communication bridge between two or more remote sites, network or devices and/or to connect multiple VPNs together.
- A VPN used to provide network security such as protect your computer and your information from sniffers (a computer Programmer that used decode data to spy, steal data, hijack devices, steals identities and etc.). Other than that, it provides secure security for the website session of the user as secure as a bank or other financial sites. Moreover, restrictions information that would lead to "freethinking" which a VPN allows users to have uncensored, secure access to anything on the internet. Some of the company used restrictions online imposed about where and when you can use their services.
- A VPN has many other advantages. One of the advantages is enhanced security so that when someone connects to the network via VPN, the data is kept safe and encrypted which saves the information away from the hackers. Another advantage is share files where a VPN service can can be used if you have groups that need to share data for a long time. In addition, it provides better performance where the bandwidth and network efficiency can generally be improved once a VPN solution is implemented.

- When a user connects to a VPN, a "tunnel" (no one can go in or out through the tunnel,. only specific person can) is created and it acts as a secure line of communication. The communication passed through it cannot be read if intercepted vecause it has been encrypted. Only the VPN client on your computer and the VPN server know the key to the encryption so data only encrypted in transit. but instantly can be readable at the source and destination. The processes is as simple as logging in as far as the user is concerned. The rest is taken care for you by the chosen VPN provider.
- A secure modems is a networking devices that can be both modulates and demodulates analog which carry signals called sine waves. It is a process for encoding and decoding the digital information. The modem completes both tasks simultaneously. Therefore, the term modem is a combination of modulate and demodulate.
- A secure modems has many advantages. One of the advantage is there is no limited access of the systems. Other than that, it convert digital signals to analog signals which means the modem is modulation or modulation. Another advantage is more useful in connecting LAN with the internet.
Intrusion Detection System (IDS)
References:- An intrusion detection system (IDS) is a security software that works by monitoring system activities to inspect a vulnerability in the system. For example, when someone or something is trying to compromise an information system through malicious activities or through violation security policy,it will automatically alert the administrations and monitors the Internet to find the latest threats that could lead to further attacks.
- An IDS has a lot of advantages. One of the advantages is the alert security system which has more accuracy and standard alarms understood by user. Another advantage is provides a user friendly interface which allows easy security management systems. Other than that, it can easily detect and report any changes to files and directories on the systems.
- An IDS monitors your network for possible dangerous activities such as malicious acts and violations of security policy. When such a problem is detected, it will alerts the administration but doesn't necessarily take any other actions.
- A network intrusion detection system (NIDS) monitors packets moving into and out of a network or subset of a network. It could monitor all traffic, or just a selection, to catch security threats.
- A host intrusion detection system lives on and monitors a single host (such as a computer or device). It might monitor traffic, but it also monitors the activity of clients on that computer.
No comments:
Post a Comment