A-Z Popular Blog Security Search »
Information Security
 Advertisements

24 Examples of Network Security

 , updated on
Network security is the practice of securing networks against unauthorized access, modification, misuse, interference or interruption of services. Information security threats are typically transmitted, orchestrated, controlled and executed using networks. As such, network security is key to preventing, detecting and defending organizations and individuals against information security incidents. The following are common network security techniques.
Air Gap
A computer network that physically can't connect to other networks.
Audit Trail
Logs and databases that record things that happen on your network.
Authentication
Verifying the identity of a person or digital entity.
Authorization
The process of granting access to a resource to an authenticated entity.
Cryptography
The practice of coding data so that it can't be directly read.
Overlay Network
A logical computer network built on top of another network.
VPN
A service that uses cryptography and a remote proxy to access a network.
Defense in Depth
Multiple layers of security controls that do not assume anything about the other layers.
Honeypot
A fake network resource designed to detect or divert attacks.
Mutual Authentication
A process whereby two entities such as a client and server authenticate each other.
Firewall
A security system that controls incoming and outgoing traffic to a network.
Network Perimeter
A boundary built around a network using security infrastructure such as firewalls.
Penetration Test
Testing security by simulating attacks.
Proxy Service
An intermediary between a client and server.
Tarpit
A network resource that is intentionally slow in order to slow an attack.
Intrusion Detection
A service that detects suspicious activities on a network.
Intrusion Prevention
A service that detects suspicious activity and actively blocks it.
Access Control
Restricting access to resources based on security policies.
Incident Response
The process of managing information security incidents.
Endpoint Security
Securing endpoints on a network such as desktops and mobile devices.
Vulnerability Assessment
The process of identifying security vulnerabilities on a network.
Patch Management
The practice of updating network devices, services and endpoints.
Threat intelligence and modeling
The process of monitoring and analyzing real-world cybersecurity threats.
Security Culture
Involving organizations in security with techniques such as security awareness training.

Network Security

This is the complete list of articles we have written about network security.
Air Gap
Audit Trail
Darknet
Authentication
Network Security
Canary Trap
Networking
Tree Packet
Networks
Cryptography
Data Breach
Defense In Depth
Digital Identity
Geofencing
Honeypot
Information Security
Security Testing
IoT Security
Mutual Authentication
Network Perimeter
Offline Network
Overlay Network
Passive Attack
Penetration Test
Privacy
Proxy Server
Sandbox
Security Controls
Tarpit
Zero-day
If you enjoyed this page, please consider bookmarking Simplicable.
 

Information Security

A list of information security considerations.

Technology Risk Management

A reasonably comprehensive overview of technology risk management.

Root Access

A complete guide to root access.

Not Applicable

The definition of not applicable or N/A with examples.

Patch Management

An overview of patch management with examples.

Offline Software

The definition of offline software with examples.

Personal Data Types

A list of the common types of personal data.

Digital Preservation

The definition of digital preservation with examples.

IT Gaps

An overview of IT gaps with examples.

IT Modernization

An overview of IT modernization with examples.

Cybersecurity Risk

An overview of cybersecurity risk at the organizational level.

IoT Security

The unique problem of security the internet of things.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map