To
knowing the titles used for the people involved in breaching security. It would
also be beneficial for you to start with a basic understanding of the security
devices involved in stopping these individuals. You are probably familiar with
some of these and most of them will be discussed at much greater length in
subsequent.
Firewall:
The
most basic security device is the firewall. A firewall is a bridge between a
network and the outside world. Sometimes a firewall takes the form of a stand –
alone server, sometimes a router, and sometimes software running on a machine.
Whatever the actual form, a firewall Selects people that from where they are
access and as well as exiting the network.
Proxy Server
A
proxy server uses a firewall to hide the internal network’s IP (Internet
Protocol) address and present a single IP address (its own) to the outside
world. A proxy server is a server that it’s between a client application, i.e.
a Web Browser and a real server. It stops all application to see the server
itself. If it doesn’t forwards the request to the main server. Proxy server has
two main purposes: to improve performance and filter requests.
Intrusion Detection System (IDS)
Firewalls
& proxy server guard the perimeter, they don’t interfere in network access
people that from where they are accessing. These two ways of safe guards are
augmented by Intrusion Detection System. The IDS monitors the traffic that from
where these are coming on site. It also point out the person that who are
damaged your system security.
Activities
The
last set of terms that you need to be familiar with delving deeper into the
security are the names given to the activities involved in either breaching
security or preventing a security breach. These terms also used throughout text.
Phreaking
Another
type of specialty hacking involves breaking into telephone systems. Phreaking
is sub-branch of the hacking. The Dictionary of New Hacker actually defines
phreaking as “The action of using mischievous and mostly illegal ways in order
to not pay for some sort of telecommunication bill, order, transfer, and other
services.” Phreaking requires a rather significant knowledge of
telecommunication & many Phreakers have some professional experience
working for a phone company or other telecommunication business. This type of
activity is often dependent upon specific technology required to compromise
phone systems more than simply knowing certain techniques, i.e. there are many
devices used to compromise telephone system. Telephonic systems are dependent
on frequencies. Machines that record & duplicate frequencies are essential
to phone phreaking.
Authentication
It is to security devices discussed above. There are specific security activities. Authentication is the most basic security activity. If this was the case, the process of determining the weather would have been more credible.
. When
you log in with your username and security code. You will be granted access.
Auditing
Another
crucial safeguard is auditing. Auditing is the process of reviewing logs,
records and procedures to determine whether these item most standards. These activity
will mentioned in different places.
Network Security Paradigms
Taking
the approach to your security affects all subsequent security decisions and
sets the tone for the entire organization's network security infrastructure. Network Security sample rate may be either
protective measures Scope (parameter, layered) or system is so active.
Perimeter
Security
In
a perimeter security approach, most security efforts are focused on the network
frame. This may include the possibility of reduced network firewalls to make
non-authorized access, proxy servers and keyword policy or any technology or
method. Little or no effort is made to secure the system within the network. In
this approach, the circle is safe, but the various systems within that circle
are often weak.
The
perimeter approach is clearly flawed. So why do some companies use it? If a
small organization is a budget constraint or an inexperienced network
administrator, they can use it. This method might be adequate for small organizations
that do not store sensitive data but it rarely works in a larger corporation
setting.
Layered Security
A
layered security approach individual systems within the network that is not
only safe, secure area. All servers, workstations, routers and hubs within the
network are secured. One way to accomplish this is to divide the network into
sections and secure each segment as if it were a separate network so that if
there is perimeter security neither compromised, nor all internal system are
affected. Layered security is the preferred method whenever possible.
Proactive Versus Reactive
You
should also measure your security approach by how proactive and / or reactive
it is. This done by gauging how much of the system’s security infrastructure
and policy are dedicated to preventive measures as opposed to how much are
devoted to simply responding to an attack after it has occurred A passive
security approach does little or nothing to prevent an attack. A dynamic or
active defense is one in which measures are taken to prevent attacks from
occurring.
One
example of a proactive defense in the use of IDS, which works to detect
attempts to circumvent security measures. This system is the system
administrator can tell you that trying to break security, even if not
successful attempt. IDS can also be used to detect various techniques that
intruders use to assess a target system, thus alerting a network administrator
to the potential for an attempted breach before the attempt is even initiated.
Hybrid Security Method
In
the real world, network security is usually a combination of approaches and not
focused completely in on paradigm or another. The two categories also combine.
One can have a network that is predominantly passive, but layered, or one that
is primarily perimeter but proactive. It can be helpful to consider approaches
to computer security along a Cartesian coordinate system, with the x axis
representing the level of passive-active approaches and the y axis to reflect
the range covering the perimeter defense.
The
most desirable hybrid approach is a layered paradigm that is dynamic, which
would be located in the upper right-hand quadrant. In this system, there would
be perimeter security as well as layered internal security. The intrusion detection
system to make a more complete security solution that would give a level of
dynamic activities.