Network Security Architecture and Security Monitoring
Network Security Architecture and Security Monitoring
There is a criminal case in a few weeks that's about a
internet and rarely the case is a robber and you must know what they steal from
a social media is password account, credit number card, or any important data
and there was a few tricks for them to steal your privacy account through a
phising email scan and use some device or a software that can see your moves
when you access any website possibly leaked data precentace 71% occur because
attacked from inside causes some people outside can come through the personal
system because omission by self that not often to updating system.
Therefore needed to watch any go out and go in from network
system cause system network monitoring also can be a way to look a safety slot
from that system how strong it is can be looked not just that when monitoring
the network we could see many kind of effort to lay down the system.
And you should know that mechanism of the system monitoring
this and we called intruder detection system (IDS) you can watch the plot data
and have to tell the administrator from email.
This is a few example from ids software :
·
Autobuse
one of many example software using for detection of probing (port scanning)
with logfile monitoring
·
Courtney
and Portsentry using for detetction of probing and monitoring data stream even
have some primacy. And for using that we could attack the ip address in filter
tcpwrapper
·
Shadow
for SANS from a snort detection pattern from data when passes and if the
pattern detected automaticly sent an alert.
Network monitoring also connected with SNMP protocol (Simple
Network Management Protocol) can't deny it SNMP first version very often used
rather than second version that more ensure to monitoring than first version
that very unsafety.
Example from Network Monitoring program using SNMP is :
·
Hp
Openview (Windows)
·
Packetboy
(Windows)
·
Packetman
(Unix)
·
Snmp
Collector (Windows)
·
Etherboy
(Windows)
·
Etehrman
(Unix)
·
Webboy
(Windows)
And also there is a Network Monitoring not using SNMP and here the example :
·
Netwatch
was include a package with Linux Debian .
·
Ntop
could monitoring network like a top program that procced in UNIX system.
·
Iplog
Updlog and icmplog is focus for monitoring package IP, ICMP, and UDP .
·
Iptraf
was including in a pack of Linux Debian.
·
Trafshow
can show you way from others hosts in a Text Mode.
In the network security architecture section you are also
need to know that there are several components in it that are incorporated in
the function of the connection between components, and some activities are there and I will describing about
Several components that exist in the network Security Architecture :
·
Identity
Management
·
Authorization
System
·
Policy
Management
·
Monitoring
System
·
Centralized
Resource
·
Access
Control
·
Security
Operation
·
Secure
Intranet / Lan
·
Physical
Security
·
Secure
Internet
Well maybe just this article about what is in the security of
a network both the components of the software program. The monitor that is used
and others please enter comments or criticisms about the article that I made
waiting for the next article, See yeah.
0 Response to "Network Security Architecture and Security Monitoring"
Post a Comment