Perimeter-Security

Perimeter-Security

Perimeter Security:-

The ideal “perimeter Security” is something that has long intrigued security practitioners. They have fought against emerging malware strains and external threats to strengthen a network’s interior.

Perimeter Firewall:-

A firewall installed between a private network and other public networks, such as the Internet. A perimeter firewall controls all traffic between the internal network and other networks.

Perimeter firewalls control the flow of network traffic entering or leaving the host or organisation's border or outer boundary, providing a first line of defence against external attacks and blocking access to inappropriate content from inside an organisation.

Perimeter IDS/IPS:-

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are a family of security solutions that look for anomalous traffic on the network they are connected. They occupy signature-based scanning with behavioural heuristics to learn your network’s normal traffic patterns and to alert you when rules and thresholds have been breached.

Secure DMZ’s:-

It is advised to keep the rules that allow traffic between the DMZ and an internal network as tight as possible. Too often, administrators seeking to troubleshoot a problem create a rule allowing full access between a DMZ system and a back-end server on the internal network (or the entire internal network). This defeats the purpose of the DMZ and effectively merges it with the internal network. Instead, create specific firewall rules that allow communication only between specific servers on specific ports required to meet business requirements.

Message Security (Anti-Virus, Anti Malware):-

Message security is the practice of encrypting messages on your device so that they can be read only by the intended recipient. Confidentiality Message encryption is the only way to ensure that only the indented recipients are reading your messages.

Honey Pot:-

Honeypot is an Internet-attached server that acts as a decoy, luring in potential hackers in order to study their activities and monitor how they are able to break into a system. Honeypots are designed to mimic systems that an intruder would like to break into but limit the intruder from having access to an entire network. If a honeypot is successful, the intruder will have no idea that he is being tricked and monitored.

DLP:-

Data breaches pose a serious threat to organisations of all sizes, as the number of incidents and associated costs are on the rise. Whether a data leak was intentional or not, it can also cause permanent damage to the reputation of your organisation. Data Loss Prevention (DLP) is a comprehensive service that helps to keep your confidential data private. It prevents data breaches and enforces compliance by scanning text and files to detect sensitive information attempting to exit your network.

Hanish Shan, MBA

SAP Specialist |SAP EHS | SAP Sustainability | Project Management | SAP PLM | Supply Chain | ESG | Management Consulting & Solution Advisory | ISO IMS Internal Auditor | SAP 3x Certified

5 年

Great information Mr.Pugazh

回复

要查看或添加评论,请登录

Pugazheanthi Raja的更多文章

  • The Web Evolution: From Static Pages to Smart Connections

    The Web Evolution: From Static Pages to Smart Connections

    Accelerating Global Growth Through Information In today’s fast-paced digital world, information is the driving force…

    2 条评论
  • Blockchain: The Digital Art Revolution - History & mystery of Satoshi Nakamoto Bitcoin

    Blockchain: The Digital Art Revolution - History & mystery of Satoshi Nakamoto Bitcoin

    If a new technology is successful, it can lead to job openings and trading/share market growth. Now most of the big…

    4 条评论
  • Essential Reads on Ransomware Attack & Protection

    Essential Reads on Ransomware Attack & Protection

    Maintaining the datacenter is like operating a car in heavy traffic at a full speed. Even if we drive defensively and…

    12 条评论
  • A Dive into the categories of the Internet!

    A Dive into the categories of the Internet!

    The Internet is full of easy access to information where all of us can view the topics of our own interest and…

    5 条评论
  • MIMA -Man in the Middle attack

    MIMA -Man in the Middle attack

    MIMA -Man in the Middle attack, (Credit card / Online/Net banking steal.) A Man-in-the-Middle (MITM) attack happens…

    6 条评论
  • DOS & DDOS ATTACK

    DOS & DDOS ATTACK

    What is a Dos and DDoS Attack? When we understand the ability of this attack, the working of its crippling methods and…

    9 条评论

社区洞察

其他会员也浏览了