Security
Network security consists of policies and practices to prevent and monitor unauthorized access, misuse, and denial that occur on computer networks.
Network security involves authorizing access to data on the network, which is controlled by the network administrator. Users choose or are given ID and password or other authentication information that allows them to access information and programs in their own authority.
Network security covers a variety of computer networks, both public and private, which are used in daily work, conducting transactions and communication between businesses, government agencies and individuals. The network can be private, such as within a company, and others that may be open to public access.
Network security is involved in organizations, companies and other types of institutions. Like how to secure the network, and protect and oversee the operations carried out. Where the most common and simplest way to protect network resources is to set a unique name and an appropriate password.
Security Concept
In maintaining network security, basic concepts or laws commonly referred to as CIAs are applied; Confidentiality, Integrity, and Availability.
Confidentiality is a set of rules that restrict access to information. Integrity is a guarantee that information can be trusted and accurate, and Availability is a concept where the information is always available when needed by people who have access or authority.
1. Confidentiality
Confidentiality is equivalent to privacy. Confidentiality is designed to prevent sensitive information and ensure that the people who have access are the right people. Sometimes maintaining the confidentiality of data can involve special training for those who know the document.
2. Integrity
Integrity involves maintaining data consistency, accuracy, and trust. Data cannot be changed, and steps must be taken to ensure that data cannot be changed by unauthorized persons.
3. Availability
Availability is the best concept that can be ensured in maintaining all hardware, making improvements to hardware as soon as possible when needed. It also can maintain the operating system environment.
With the concept in the availability, information can always be available when needed by people who have access or authority. Until when a user needs that information, information can be accessed and used quickly.
Types of Security
Active Devices
This type of Network Security blocks excessive traffic. Firewalls, antivirus scanning devices, and content filtering devices are examples of these devices.
Passive Devices
Perangkat ini mengidentifikasi dan melaporkan traffic yang tidak diinginkan, misalnya, intrusion detection appliances.
Preventative Devices
This device scans the network and identifies potential security problems. For example, penetration testing devices and vulnerability assessment appliances.
Unified Threat Management (UTM)
This device functions as an all-in-one security device. Examples include firewalls, content filtering, web caching, and others.
Hardware and Software Firewalls
Hardware firewalls are commonly referred to as standalone products which are also found in broadband routers. Most of these hardware firewalls provide at least four network ports to connect with other computers.
While Firewalls software is installed on your computer. Usually this firewalls software protects your computer from internet threats.
Antivirus
Antivirus is a tool used to detect and remove malicious software. This antivirus was originally designed to detect and remove viruses from computers.
Content Filtering
This Content Filtering Tool filters out unpleasant and offensive web pages or emails. This content filtering is used as part of a firewall in a company or on a personal computer. This tool will bring up the message “Access Denied” when someone tries to access a web page or email that is not valid. Filtered content is usually content that contains pornography, violence or hatred.
Intrusion Detection Systems
Intrusion Detection Systems, or commonly referred to as Intrusion Detection and Prevention Systems, are devices that monitor dangerous activities on the network, record information about those activities, take steps to stop them, and finally report them.