In this article, we have a look at a broad range of network security threats that concerns an enterprise user, what is Unified Threat Management (UTM) and why it is required, the types of UTM – hardware based, software based and distributed model, and the advantages and limitations of UTM based network security solutions.
Threats arising due to internet usage are quite wide. We will look at a few of them, especially the ones where cyber criminals use deception as the main tool to trick the net users and either plant malicious software in the computers which might later act as botnets, spyware etc. or make them come to the websites under their control.
Recently, the micro-blogging platform Twitter was down for more than two hours, thereby denying access to many users across the world for that time. The culprit was found to be a Denial of Service attack launched by multiple zombies sitting on networked computers (Also called as Distributed Denial of Service attacks). We give an introduction to Twitter and DoS attacks in this article.
This article gives an introduction to Host Integrity Check mechanism that enables enterprises to enforce the connectivity of their endpoints (Laptops/Desktops) only if they comply to the security policies of the network (Like latest patches, signature updates etc), the components of such a solution, host integrity check for managed, unmanaged and unmanageable endpoints, challenges for deploying host integrity check applications.
This article looks at the main types of Denial Of Service attacks like Previously known DoS attacks (Juno etc.), Unknown DoS flooding attacks, SYN floods, connection limit attacks etc. in an enterprise network and the ways in which IPS systems mitigate those attacks.
This article provides an introduction to what is URL Filtering, why it is needed and how it is done at enterprise level. We also have a look at the various factors involved in categorizing the websites and updating them. The advantages and dis-advantages of URL filtering are also discussed.
This article attempts to see if bulk enterprise security policies can be applied to portable devices like USB pen drives, mp3 players, cellphone connecting through USB, CD/DVD media, Digital Cameras etc, if they can be managed from a central software application, and the features offered by such an application for Data Leakage Prevention.
This article explains what are Phishing attacks, why it is a network security threat, how emails are used to gain confidential information, what else the phishers can do other than directing to a fradulent website, how such Phishing attacks are mitigated by enterprise companies. There is also a small introduction to a related threat – Pharming.
This article examines the different types of Firewall technologies. The four common types of firewalls are: 1. Packet Filtering Firewalls
2. Circuit level gateway Firewalls
3. Application level gateway Firewalls
4. Stateful multi-layer inspection Firewalls
This article covers an overview of the products and technologies that help maintain network security. We would see small introduction to firewalls, anti-virus, anti-spam, content filtering in email, URL web filtering, Intrusion Prevention Systems (IPS) and UTM (Unified Threat Management).