Network Security Applications

1063 Words Aug 29th, 2013 5 Pages
Network Security Applications and Countermeasures |Domains |CIA Functions | |
|Ethical Hacker |User domain |Confidentiality |
|Intrusion Detection system / intrusion |WAN Domain |Integrity |
|prevention system | | |
|Access controls |User Domain |Confidentiality |
|Failover server |Systems/ Applications Domain |Availability
…show more content…
Firewalls are set up on computers to help protect computers and other devices from attacks from potentially harmful websites and other resources. Proxies are servers that act as a middle man for computers. They allow users to make indirect connections to other servers. The LAN-to-WAN domain is where the infrastructure connects to the Internet. Updates, firewalls and proxies will help to keep things running and help to keep it protected. The fifth domain is the WAN domain. In this domain, the network security application that is apart of it is the intrusion detection system/intrusion prevention system (IDS/IPS). This device monitors the system for malicious activities and reports it back (Kim & Solomon, 2012). The WAN Domain connects to remote locations and using the IDS/IPS is crucial because it will help to remote if any outside activity is trying to access the system that should not be. The sixth domain is the Remote Access Domain. In this domain, the network security applications that is apart of it is Proxies. Similar to LAN-to-WAN domain, proxies help to allow users to connect to server through another server. Remote access allows users to connect to the server remotely and Proxies give a user the opportunity to use a proxy server to do this. The seventh domain is the Systems/Applications Domain. In this domain, the network security
Open Document