Info@NationalCyberSecurity
Info@NationalCyberSecurity

My First Week in Cisco’s Networking Academy: Intro to Cybersecurity | by Poray Casimier | Jan, 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


Day 4:

Our topic for today revolves around technology and devices used within Cybersecurity. I’ll go over 5 of the main tools described for this Module.

  1. Routers:

We use them every day if we have wifi at home! This device helps to provide basic traffic filtering and define which computers from a specific network communicate with other network segments and devices.

2. Firewalls:

Firewalls help to monitor incoming network traffic and identify any malicious traffic or behavior that might pose a threat to us. This tool has sophisticated security policies in place that are applied to the traffic that passes through.

3. IPS/IDS

Intrusion Detection Systems (IDS) are dedicated devices within a server, firewall, or operating system that scan large amounts of data against a list of rules and malicious attack signatures in traffic. Their primary goal is to detect, log, and report suspicious behavior. However, they are unable to take action to prevent attacks if a dangerous match is found.

Intrusive Prevention Systems (IPS) are the IDS’s best friend. They help to block and deny traffic based on positive rules or signature matches. The most popular IDS/IPS system is Snort, but its commercial version Sourcefire performs all duties mentioned above including the detection of probes, content sourcing and matching, and execution of port scans in real time.

4. Antimalware/Antivirus Software

The purpose of Antimalware and Antivirus software is to find and block malicious code from executing by using signatures and behavioral analysis from applications.

5. VPNs

Virtual Private Networks (VPNs) allow remote employees to use a secure tunnel from their device and connect back to an organization’s network which helps to encrypt data, mask your IP address, and work around blocks or firewalls online.

Implementing these tools properly alone or through an organization can help to ensure that everyone’s data is kept secure for an enjoyable experience!

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW