Technical Controls. Firewalls. Intrusion prevention systems (IPS) Virtual private network (VPN) concentrators and clients. TACACS+ and RADIUS servers. One-time password (OTP) solutions. Smart cards. Biometric authentication devices. Network Admission Control (NAC) systems. This is a introductory video to a domain of Information technology that is Network security. Definition of. Find out which five network security fundamentals are vital to downtime prevention, regulation compliance, reduced liability, and reputation protection.


Author: Arnoldo Bahringer II
Country: Singapore
Language: English
Genre: Education
Published: 14 December 2015
Pages: 515
PDF File Size: 41.72 Mb
ePub File Size: 37.46 Mb
ISBN: 520-9-73023-979-3
Downloads: 18824
Price: Free
Uploader: Arnoldo Bahringer II


These concepts are important not only for succeeding with the IINS exam, but they are fundamentals at all security endeavors on which you will be embarking.

What is Network Security? - Definition & Fundamentals |

Building Blocks of Information Security Establishing and maintaining a secure computing environment is increasingly more difficult as networks become increasingly interconnected and data flows ever more freely. In the commercial world, connectivity is no longer optional, and the possible risks of connectivity do not outweigh the benefits.

Therefore, it is very important to basic network security concepts networks to support security services that provide adequate protection to companies that conduct business in a relatively open environment.

This section explains the breadth of assumptions and challenges to establish and maintain a secure network environment.

Network Security: Top Five Fundamentals

Basic Security Assumptions Several new assumptions have to be made about computer networks because of their evolution over the years: Modern networks are very large, very interconnected, and run both ubiquitous protocols such as IP and proprietary protocols.

Therefore, they are often open to access, and a potential attacker can with relative ease attach to, or remotely access, such networks. Widespread IP internetworking increases the probability that more attacks will be carried out over large, heavily interconnected networks, such as the Internet.

Computer systems and applications that are attached to these networks are becoming increasingly complex. In basic network security concepts of security, it becomes more difficult to analyze, secure, and properly test the security of the computer systems basic network security concepts applications; it is even more so when virtualization is involved.

Network Security Concepts and Policies > Building Blocks of Information Security

When these systems and their applications are attached to large networks, the risk to computing dramatically increases. Basic Security Requirements To provide adequate protection of network resources, the procedures and technologies that you deploy need to guarantee three things, sometimes referred to as the CIA triad: Providing confidentiality of basic network security concepts guarantees that only authorized users can view sensitive information.

Providing integrity of data guarantees that only authorized users can change sensitive information and provides a way to detect whether data has been tampered with during transmission; this might also guarantee the authenticity of data.

Availability of systems and data: System and data availability provides uninterrupted access by authorized users to important computing resources and data.

When designing network security, a designer must be aware of basic network security concepts following: The threats possible attacks that could compromise security The associated risks of the threats that is, how relevant those threats are for a particular system The cost to implement the proper basic network security concepts countermeasures for a threat A cost versus benefit analysis to determine whether it is worthwhile to implement the security countermeasures Data, Vulnerabilities, and Countermeasures Although viruses, worms, and hackers monopolize the headlines about information security, risk management is the most important aspect of security architecture for administrators.


A less exciting and glamorous area, risk management is based on specific principles and concepts that are related to asset protection and security management.

An asset is anything of value to an organization. basic network security concepts


By knowing which assets you are trying to protect, as well as their value, location, and exposure, you can more effectively determine the time, effort, and money to spend in securing those assets.

A vulnerability is a weakness in a system or its design that could be exploited by a threat. Often, the vulnerabilities are in the operating systems and applications. Written security policies might also be a source of vulnerabilities. This basic network security concepts the basic network security concepts when written policies are too lax or are not thorough enough in providing a specific approach or line of conduct to network administrators and users.

A threat is any potential danger to assets.

A threat is realized when someone or something identifies a specific vulnerability and exploits it, creating exposure. This may seem strange in the view of security, but remember that data in network security is the same as money in a bank vault.

Other Relevant Articles: