Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

How can student secure the network, Summaries of Network security

That was the resub of network security course

Typology: Summaries

2021/2022

Uploaded on 06/06/2023

noy-alam
noy-alam 🇬🇧

5 documents

1 / 5

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
DMZ:
Protects an organization internal local area network from untrusted traffic
Organization typically stores external facing services and resources
Enabling access control
Preventing network reconnaissance
Blocking Internet Protocol (IP) spoofing
The way DMZ promotes the security:
Web: Web is the part of Internet which have many pages and outpoured by any Browser.
It is the short of World Wide Web. As instance, if any client wants to access his or her
website but does not know whether the website is attacked with any virus or not. For this
if a DMZ is placed with internet before the website will check if the application is okay
or not. If it is not okay, then the DMZ will not send the website. It may also stop the
spammer from getting access on the website
Mail: DMZ helps people to feel safe by protecting their personal messages. As DMZ
notices and aids the network from getting any messages that may be harmful or may
pf3
pf4
pf5

Partial preview of the text

Download How can student secure the network and more Summaries Network security in PDF only on Docsity!

DMZ:

  • Protects an organization internal local area network from untrusted traffic
  • Organization typically stores external facing services and resources
  • Enabling access control
  • Preventing network reconnaissance
  • Blocking Internet Protocol (IP) spoofing

The way DMZ promotes the security:  Web: Web is the part of Internet which have many pages and outpoured by any Browser. It is the short of World Wide Web. As instance, if any client wants to access his or her website but does not know whether the website is attacked with any virus or not. For this if a DMZ is placed with internet before the website will check if the application is okay or not. If it is not okay, then the DMZ will not send the website. It may also stop the spammer from getting access on the website  Mail: DMZ helps people to feel safe by protecting their personal messages. As DMZ notices and aids the network from getting any messages that may be harmful or may

contain any sorts of virus when it is checked. It also makes sure that that the emails are not displayed to an undesired traffic. As DMZ supplies traffic strain that makes sure that individual traffic is safe and doesn’t have a risk to harm the network that can be gained, so DMZ is important. Attacks from spammers and viruses are also controlled. It moderates if any hacker is trying to access in the inner network and assist the network not to get attacked by outer source. As the servers that the business uses remains revealed and as employees uses the internet for their communication purpose, so DMZ helps to form a hurdle between the internet and the network. Static IP

  • Non-changing internet address
  • Remote-access convenience
  • Server hosting
  • Running Servers
  • Stability
  • Faster Download/upload Speeds
  • Improved DNS Support The way Static IP promotes the security:  For creating another security part, you can use static IP address over DHCP server. Definite devices relate to by appending security with it and can be developed when required. This makes sure that along with the network its, it protect all other network which are being used for communication and the devices which will be used to protect data and information from getting scammed or leaked.  As if you static IP address which guarantees information can be accessed, so It assists to reduce errors in the connection. Again, if there is any network problem, then static IP address will secure it. When you use static IP address, it restricts the possible threats of the loss of data if there is any problem in using devices such as fax machine, computer, printer, etc. It aids the server to be stable and smooth. Static IP makes sure if the server can communicate and get the required files.

The examples regarding the evolution of NAT:  Web: When a person browses a website. NAT makes sure that the history of browsing remains private and cannot be known. It secures the privacy of the history of information to remain unknown. The information may be related to both personal and professional. Since hackers may attack so NAT is important  NAT guarantees that the hackers cannot hack or steal any information and cannot know from where to start. It makes sure that any personal information of both employee and client cannot be accessed by outsiders. NAT makes sure about the privacy and security of the business and protects them.  Email: NAT provides security by protecting emails and messages by reducing the risk of people outside the network not able to send virus attacked messages and emails which helps by not getting spam messages in the network. It also reduces any security threat and provides security.  Data protection: If any private data is kept secret, the NAT makes sure that outsiders cannot access the network. It becomes difficult for them to steal data. When it provides security then it guarantees that any unauthorised people cannot access it. NAT not only

protects secret data, but it also secures the network and identifies unauthorised access and cyber-attack threats.