Third party image reference |
With the Advancement
of the internet, every day there is produced a large amount of data. and the
rapid growth of data. we need to protect our data from others.
there are many network
security threats spread over the internet, making it imperative to monitor and
prevent unauthorized access, and misuse of the internet.
however, network
security is now undergoing a transformation stage with the rapid development of
mobile devices and cloud computing.
There are many types
of security management system like Secure email gateway, secure web
gateways, enterprise network firewalls, web application firewalls, application
delivery controllers and enterprise network firewalls and so many.
But to use of these things first you need to
know several technical terms.
1. NAT
2. Proxy
3. Packet Filters
4. Stateful Packet
Filter
5. Protocols
6. Authorization
7. Authentication
8. Content protection
9. Information
exchange
10. Program controls
11. Antivirus
12. Antimalware
13. Error detection
and correction
14. Package switching
15. Gateway
16. Message switching
17. Control
18. Admin
with the help of these
things, you put yourself in a safe zone to serve the information on the
internet. and it also helps you how to use different tools to feel safe while
surfing the internet.
so, let's start
1. NAT(network address translator).
This is a patent
application which is the process of modifying the IP information in IP
packet headers.
with the help of NAT,
the packets can be routed to the required destination.
2. Proxy.
It is a barrier
between internal and external networks. a proxy is a security software firewall
which is installed on a proxy server and act as a barrier between external
networks and internal networks. it is used for the block to unauthorized
external resources.
3. Packet Filters.
It is a firewall
technique. which is used to control network access. and monitoring out and
incoming packets and information. it is based on source and destination
internet protocol address.
4. Stateful Packet Filters.
It is used for keeps
track the state of network connections which is traveling across the
network.
5. Protocols.
It is a subset of
rules. which is control the information communication over the internet.
6. Authentication.
It is a process by
which a system verifies the identity of a user who wishes to access the
information.
7. Authorization.
It is a process of
allowing authenticated users to access the resources by verifying whether the
user has access rights to the system.
8. Content Protection.
It is a process in
which an organization arranges the security arrangement for safeguarding access
to data.
9. Information Exchange.
It is a process by
which we transfer information or other things between devices and
component.
10. Program Controls.
It is an arrangement
for controlling various aspects of programs such as loading, initialization,
resource allocation etc.
11. Antivirus.
It is a software which
is designed and used to detect and destroy computer viruses.
12. Antimalware.
It is a software which
is designed and used to prevent, detect and remediate malicious programming on
individual computing devices and IT systems.
13. Error Detection and Correction.
It is a network
monitoring system for fault detection and correction.
14. Packet Switching.
It is a digital
network transmission process in which data is broken into suitably-sized pieces
or blocks for fast and efficient transfer via different network devices.
15. Gateway.
It is an
arrangement for connecting networks having different types of a switching
system.
16. Message Switching.
It also a switching
technique in which data is routed in its entity from the source node to the
destination node.
17. Control.
The mechanism for
temporarily stopping the transmission of data on ethernet family computer
networks.
18. Admin.
It is a monitoring and
testing arrangements for managing data switching networks.
These things
definitely help you to secure while surfing the internet.
Tags:
Technology