Ahi Consulting
CyberSecurity & BlockChain

Network Security

4. Network Security

Network Security consists of the Policies and Practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of Network Resources.

Network Security starts with Authenticating, commonly with a username and a password (Known as One Factor Authentication)

       With Two-Factor Authentication, something the User 'has' is also used (i.e: Mobile Phone) 
       With Three-Factor Authentication, something the User 'is' is also used (i.e: Fingerprint)

Once authenticated, a Firewall (Software or Hardware Firewall) enforces access policies such as what services are allowed by whom (i.e: Network Users). Communication between Two Networks and/or an External Host accessing your Network may be encrypted (i.e: VPN) to maintain privacy.

The best solution for Network Security is to proactively know who is in and/or traveling in your Network. Auditing event logs and active monitoring combined with learning algorithms are important ways to analyze your network traffic and proactively detect your network.