is the protection of the underlying networking
infrastructure from unauthorized access, misuse, or theft.
Network Security
involves creating a secure infrastructure for devices, users, and applications to work in a secure manner.
Network Security
Network security combines _______ at the edge and in the network.
multiple layers of defenses
Each network security layer implements ________.
policies and controls
_______ gain access to network resources, but ________ are blocked from carrying out exploits and threats.
Authorized users ; malicious actors
How does network security work?
Physical security
Acceptable use of applications
Safeguarding data
Remote access to the network
Data center
Wireless security
Protecting the Hardware and Software
Malware
Types of Malware ( V W B P R R R T )
Virus
Worm
Botnets
Polymorphic
Ransomware
Remote Administration Tools (RATs)
Rootkits
Trojan
Programs that copy themselves throughout a computer or network.
Self-replicating viruses the exploits security vulnerabilities to automatically spread themselves across the computers and networks.
Short for “robot network,” these are networks of infected computers under the control of single attacking parties using command and control servers.
Is a type of malware with the capacity to “morph” regularly, altering the appearance of the code while retaining the algorithm within.
Is a criminal business model that uses malicious software to hold valuable files, data or information.
Software that allows a remote operator to control a system. These tools were originally built for legitimate use, but are now used by bad actors.
Programs that provide privileged (root-level) access to a computer. _____ vary and hide themselves in the operating system.
Malware disguised in what appears to be legitimate software.
Firewalls
Firewalls
Firewalls
Firewalls
Firewall Topologies (B D D)
consists of a packet filtering router that forwards all incoming packets to the firewall software on a bastion host. Through this topology, the firewall is placed between the internet and the internal network segment.
Once the firewall is compromised, there is no impediment for the attacker to access the protected network.
It has two network adapter cards in it and two IP addresses, one for each network it is connected to.