123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Cybersecurity Technologies

Profile Picture
By Author: bollusrikanth
Total Articles: 7
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Today, the fundamental problem is that much of the security technology aims to keep the attacker out, and when that fails, the defences have failed. Every organization who uses internet needed security technologies to cover the three primary control types - preventive, detective, and corrective as well as provide auditing and reporting. Most security is based on one of these types of things: something we have (like a key or an ID card), something we know (like a PIN or a password), or something we are (like a fingerprint).

Some of the important security technologies used in the cybersecurity are described below-

Interested to learn more about Cybersecurity technologies?Join HKR Trainings!
For more information click on cybersecurity technologies

Firewall
Firewall is a computer network security system designed to prevent unauthorized access to or from a private network. It can be implemented as hardware, software, or a combination of both. Firewalls are used to prevent unauthorized Internet users from accessing private ...
... networks connected to the Internet. All messages are entering or leaving the intranet pass through the firewall. The firewall examines each message and blocks those that do not meet the specified security criteria.
Packet filtering

Packet filtering firewalls examine header information of a data packets that come into a network. This firewall installed on TCP/IP network and determine whether to forward it to the next network connection or drop a packet based on the rules programmed in the firewall. It scans network data packets looking for a violation of the rules of the firewalls database. Most firewall often based on a combination of:

Internet Protocol (IP) source and destination address.
Direction (inbound or outbound).
Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) source and destination port requests.
Packet filtering firewalls can be categorized into three types-

1. Static filtering: The system administrator set a rule for the firewall. These filtering rules governing how the firewall decides which packets are allowed and which are denied are developed and installed.

2. Dynamic filtering: It allows the firewall to set some rules for itself, such as dropping packets from an address that is sending many bad packets.

Application gateways

It is a firewall proxy which frequently installed on a dedicated computer to provides network security. This proxy firewall acts as an intermediary between the requester and the protected device. This firewall proxy filters incoming node traffic to certain specifications that mean only transmitted network application data is filtered. Such network applications include FTP, Telnet, Real Time Streaming Protocol (RTSP), BitTorrent, etc.

Circuit gateways

A circuit-level gateway is a firewall that operates at the transport layer. It provides UDP and TCP connection security which means it can reassemble, examine or block all the packets in a TCP or UDP connection. It works between a transport layer and an application layers such as the session layer. Unlike application gateways, it monitors TCP data packet handshaking and session fulfilment of firewall rules and policies. It can also act as a Virtual Private Network (VPN) over the Internet by doing encryption from firewall to firewall.
Firewall can be categorised on the basis of the generation type. These are-

First Generation
Second Generation
Third Generation
Fourth Generation
Fifth Generation
First Generation:

The first generation firewall comes with static packet filtering firewall. A static packet filter is the simplest and least expensive forms of firewall protection. In this generation, each packet entering and leaving the network is checked and will be either passed or rejected depends on the user-defined rules. We can compare this security with the bouncer of the club who only allows people over 21 to enter and below 21 will be disallowed.

Second Generation:

Second generation firewall comes with Application level or proxy servers. This generation of firewall increases the security level between trusted and untrusted networks. An Application level firewall uses software to intercept connections for each IP and to perform security inspection. It involves proxy services which act as an interface between the user on the internal trusted network and the Internet. Each computer communicates with each other by passing network traffic through the proxy program. This program evaluates data sent from the client and decides which to move on and which to drop.

Third Generation:

The third generation firewall comes with the stateful inspection firewalls. This generation of the firewall has evolved to meet the major requirements demanded by corporate networks of increased security while minimizing the impact on network performance. The needs of the third generation firewalls will be even more demanding due to the growing support for VPNs, wireless communication, and enhanced virus protection. The most challenging element of this evolution is maintaining the firewall's simplicity (and hence its maintainability and security) without compromising flexibility.

Fourth Generation:

The fourth generation firewall comes with dynamic packet filtering firewall. This firewall monitors the state of active connections, and on the basis of this information, it determines which network packets are allowed to pass through the firewall. By recording session information such as IP addresses and port numbers, a dynamic packet filter can implement a much tighter security posture than a static packet filter.

Total Views: 85Word Count: 822See All articles From Author

Add Comment

Education Articles

1. Visaboard Unveiled: Your Key To Effortless Visa Solutions
Author: visaboard

2. The Best Mobile Technician Course In Kerala: Your Gateway To A Lucrative Career
Author: Sruthi

3. Microsoft Power Apps? Use Cases With Css To Beatify Power Apps
Author: Eshwar

4. Delving Into The Fundamentals And Significance Of Cybersecurity
Author: Giri

5. Docker Online Training | Cka Training Online
Author: Teja

6. Factors To Consider While Selecting Overseas Education Consultants
Author: Shilpa Arora

7. Microsoft Azure Online Training | Microsoft Azure Training In Ameerpet
Author: SIVA

8. The Top Colleges In Windsor Gardens
Author: Avenues College

9. Sap Fico Training Institute In Ameerpet
Author: Avina technologies

10. Discovering The Best Universities In Up: Spotlight On Teerthanker Mahaveer University
Author: Kamal Kishor

11. Top 10 Benefits Of Studying In The Uk
Author: Shilpa arora

12. Embark On Your Medical Journey: Mbbs At Lomonosov Moscow State University
Author: Mbbs Blog

13. Unlock Your Medical Career: Pursue Mbbs In Romania
Author: Mbbs Blog

14. Human-centered Design: Crafting Intuitive Interfaces For Exceptional User Experiences
Author: Gokul

15. Exploring The New Frontier: Trending Courses In Logistics Studies
Author: Neerajpradeep

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: