Network security consists of policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security elements can be diverse, and include software and hardware, as servers, firewalls, routers, switches, repeaters, modems, access points, DMZs, VPNs, VMs, datacenters, cloud and internal network infrastructure.
Threats can include computer crime, vulnerability, eavesdropping, exploits, trojans, viruses and worms, denial of service, malware, payloads, rootkits and keyloggers. Networks are subject to attacks from malicious sources. Attacks can be from two categories:
Passive, when a network intruder intercepts data traveling through the network. Including network (wiretapping, port scanner, idle scan).
Active, in which an intruder initiates commands to disrupt the network’s normal operation. Including denial-of-service attack, DNS spoofing, man in the middle, ARP poisoning, VLAN hopping, smurf attack, buffer overflow, heap overflow, format string attack, SQL injection, phishing, cross-site scripting, CSRF, cyber-attack.
We perform an assessment of the client’s network, then later we offer tunning recommendation as we see fit. Different levels of defenses can be used, including:
- access control systems
- application security (antivirus software, secure coding, security by design, secure operating systems)
- authentication (multi-factor authentication, two-factor authentication)
- data-centric security
- intrusion detection system
- intrusion prevention system
- mobile secure gateway