Skip to main content

Security Tools

1#Firewall 

Firewall one of the most tools or devices secures your network from being attacked.

. A firewall protects the network by preventing single or several traffic to enter or exit the network. With these tools, network engineers are able to prevent any network traffic that could cause negative effects on the network.

Bald Eagle

2#Antivirus

Antivirus considers one of the most tools for individuals and commercial use to protect the network from inside and outside threats that could breach, steal or harm sensitive data.

 Antivirus is produced by different companies, but they work on the same solving problems which are detected and eliminated trojans, rootkits, and malicious code.

Bald Eagle

3#Access Control

Access Control protects the data accessed by all. Companies have different levels of network engineers, each responsible to access devices or data to modify or monitor several things, to do that we need Access Control to classify them based on their privileges. 

Classification could be done by creating whitelists and blacklists, whitelisted are able to do anything on the data or network based on their privileges; however, blacklists could not either access data or modify it.

Comments

Popular posts from this blog

types

 Data security protects your data from being accessible by unauthorized individuals, detecting what the accessed user did in the data or network, user actions saved as a log, and availability to access the data at any time. Those three fundamentals could conclude in the CIA of network security.

Availability

 The third popular term for data security is known as availability. the availability allows that authorized users to access data whenever they want and ensure that data are reachable. Which takes care of physical and data impacts. That physical impact such as ensuring that the power is available to that system all day considering that backup power and other physical impacts are natural disasters such as earthquakes, hurricanes, etc.  In the case of physical impacts, selecting the location of data centers is very important. In the case of data impacts, the most familiar terms in this section are called redundant networks or data. Redundant networks are focused on preparing alternative paths to access data in case of access to the main path is a failure, where the switching is done automatically. Whereas, the redundant database concentrates on providing an extra one or more databases to back up the main one. The Availability is to ensure that data or apps will be available and r...

Integrity

 The second term of data security is known as Integrity. In the previous term, we talk only about accessing data or viewing data and users can only explore the data without any modification on it. Integrity has the same functionality as confidentiality, but accessible users could make modifications to that data either by addition or deleting, or moving the data.  The Integrity will ensure that data correctness and accuracy by blocking unauthorized individuals to do any kind of modification. There are a number of tools that protect organizations or systems from being attacked from inside or outside that premises. such as using firewall devices, human monitoring the network for suspicious activity, and Access Control list privileges. Data integrity is the concept of ensuring that the data is not being tampered with or damaged by mistake or intentionally. Each accessible user has certain privileges to make modifications, but when that happens, it will register on the log file wit...