CIS225_4.3_Network_Security_Devices_Corey_Adams

docx

School

ECPI University, Greensboro *

*We aren’t endorsed by this school

Course

225

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by corada5995

Report
CIS225 – 4.3 Network Security Devices Network Security: refers to a set of rules and configurations implemented on a network using both hardware and software technologies that are designed to protect the integrity, confidentiality, and accessibility of the computer networks.   Uses of the following devices to increase network security. 1) Firewall Refers to software, hardware or both that monitors incoming and outgoing network traffic and permits, or blocks data packets based on a set of security rules. Firewalls carefully analyze incoming traffic based on pre-established rules and filter traffic coming from unsecured or suspicious sources to prevent attacks. Firewalls guard traffic at a computer's entry point, called ports, which is where information is exchanged with external devices.    2) Honeypots Refers to a computer set a side in an organization network to mimic likely targets of cyberattacks. It is used to detect attacks and to deflect them from a legitimate target. The attacker spends their time trying to access this vulnerable PC rather than target the real devices on your network.   3) Intrusion Detection System (IDS) Refers to a device that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. The IDS acquires and analyses information on malicious activities and reports them to the system administrator.      
Deciding where to put each of the devices on the network. Firewall firewalls should be placed between any network that has a connection to the internet. Honeypots here are three main locations to place your honeypot system: 1) External facing the Internet: placing your honeypot outside your network perimeter allows the security analyst to get the most malicious hacks 2) Internal behind the firewall: inside the network, with the firewall between it and the outside world. This placement is the best way to create an early-warning system to alert network security analyst to any external exploits that have made it past your other network defenses and catch internal threats at the same time. 3) On the DMZ:  It can be placed alongside your other legitimate DMZ servers and provide early warning of threats located there.   IDS It should be deployed behind the firewall on the edge of your network. This gives the highest visibility, but it also excludes traffic that occurs between hosts.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help