Cyber Crime on a Roll, CyberSecurity still catching up..!!

DocTooLs
2 min readJun 7, 2020
CyberAttacks

Not a week ago that we don’t hear about a breach or identify theft, there are security devices such as Firewalls, Switches, Routers, NIDS/NIPS, VPN concentrator, SIEM, DLP, NAC, SSL/TLS accelerator, Proxy, Load Balancers, Wireless Access points, bridges , Mail/Media Gateway , Hardware Security Modules which are used to either block the threats or delay it.

Router

Routers are used to connect the networks and operate at Layer 3 of the OSI model. A router stores information about network destinations. A border router is an outside connection of a LAN to an external WAN.

Router Security

Access Control Lists (ACL): It is used to filter packets by source address, a destination address, protocol, or port.

Zones: Segmenting networks based on functionality or security.

Antispoofing: By creating access lists which can block access to private IP addresses and localhost ranges from the internet.

Switches

It connects devices with a computer network, by using packet switching to receive, process and forward data to the destination. It works on Layer 2/Layer 3 of the OSI model.

Packet-forwarding decisions are based on MAC (Media Access Control)

Switch Security

VLANs: Segment networks and limit broadcast traffic.

Port Security — Enable/Disable, individual switches ports based on MAC address.

  • It Provides Loop prevention
  • It ProvidesFlood Guard

Proxy

It is a boundary device between internal and external networks

It’s a device that acts on behalf of others and provides security, logging, and caching

  • Proxy Server — Blocks known malicious websites
  • Forward Proxy — Retrieves data on behalf of a client
  • Reverse Proxy — Protects access to a server on the internal network
  • Transparent Proxy/inline/forged proxy/aka intercepting — A caching server that redirects client’s requests without modifying them to reduce bandwidth usage.

FireWalls

What are FireWallSs?

These are the Network security system which monitors the incoming and outgoing network traffic based on predetermined security rules.

For more information on Technologies/best practices.

We make Technology Eazy via Docs

About DocTooLss :

“We make Technology EaZy via Docs”

Follow us @doctools8 | WordPress: www.doctoolss.wordpress.com | Website: www.doctoolss.com | Facebook: https://www.facebook.com/DTdoctoolss/

--

--