What you should need to know if you are an Internet User.



Third party image reference

With the Advancement of the internet, every day there is produced a large amount of data. and the rapid growth of data. we need to protect our data from others. 

there are many network security threats spread over the internet, making it imperative to monitor and prevent unauthorized access, and misuse of the internet. 

however, network security is now undergoing a transformation stage with the rapid development of mobile devices and cloud computing. 

There are many types of security management system like Secure email gateway, secure web gateways, enterprise network firewalls, web application firewalls, application delivery controllers and enterprise network firewalls and so many.

But to use of these things first you need to know several technical terms. 

1. NAT
2. Proxy
3. Packet Filters
4. Stateful Packet Filter
5. Protocols
6. Authorization
7. Authentication
8. Content protection
9. Information exchange
10. Program controls
11. Antivirus 
12. Antimalware
13. Error detection and correction
14. Package switching
15. Gateway
16. Message switching
17. Control
18. Admin 

with the help of these things, you put yourself in a safe zone to serve the information on the internet. and it also helps you how to use different tools to feel safe while surfing the internet. 

so, let's start

1. NAT(network address translator).
This is a patent application which is the process of modifying the IP information in IP packet headers. 
with the help of NAT, the packets can be routed to the required destination.

2. Proxy.
It is a barrier between internal and external networks. a proxy is a security software firewall which is installed on a proxy server and act as a barrier between external networks and internal networks. it is used for the block to unauthorized external resources. 

3. Packet Filters.
It is a firewall technique. which is used to control network access. and monitoring out and incoming packets and information. it is based on source and destination internet protocol address. 

4. Stateful Packet Filters. 
It is used for keeps track the state of network connections which is traveling across the network. 

5. Protocols.
It is a subset of rules. which is control the information communication over the internet.

6. Authentication.
It is a process by which a system verifies the identity of a user who wishes to access the information.

7. Authorization.
It is a process of allowing authenticated users to access the resources by verifying whether the user has access rights to the system. 

8. Content Protection.
It is a process in which an organization arranges the security arrangement for safeguarding access to data. 

9. Information Exchange. 
It is a process by which we transfer information or other things between devices and component. 

10. Program Controls.
It is an arrangement for controlling various aspects of programs such as loading, initialization, resource allocation etc.

11. Antivirus.
It is a software which is designed and used to detect and destroy computer viruses. 

12. Antimalware.
It is a software which is designed and used to prevent, detect and remediate malicious programming on individual computing devices and IT systems.

13. Error Detection and Correction.
It is a network monitoring system for fault detection and correction. 

14. Packet Switching.
It is a digital network transmission process in which data is broken into suitably-sized pieces or blocks for fast and efficient transfer via different network devices. 

15. Gateway.
It is an arrangement for connecting networks having different types of a switching system. 

16. Message Switching.
It also a switching technique in which data is routed in its entity from the source node to the destination node. 

17. Control.
The mechanism for temporarily stopping the transmission of data on ethernet family computer networks. 

18. Admin.
It is a monitoring and testing arrangements for managing data switching networks. 

These things definitely help you to secure while surfing the internet. 


Post a Comment

Previous Post Next Post