Network Security Architecture And Security Monitoring Terbaru 2019


Network Security Architecture and Security Monitoring

3.jpg


There is a criminal case in a few weeks that's about a internet and rarely the case is a robber and you must know what they steal from a social media is password account, credit number card, or any important data and there was a few tricks for them to steal your privacy account through a phising email scan and use some device or a aplikasi that can see your moves when you access any website possibly leaked data precentace 71% occur because attacked from inside causes some people outside can come through the personal system because omission by self that not often to updating system.

Therefore needed to watch any go out and go in from network system cause system network monitoring also can be a way to look a paling aman slot from that system how strong it is can be looked not just that when monitoring the network we could see many kind of effort to lay down the system.

And you should know that mechanism of the system monitoring this and we called intruder detection system (IDS) you can watch the plot data and have to tell the eksekutif from email.


VPN-Network_Padlock.png

This is a few example from ids perangkat lunak :

·Autobuse one of many example software using for detection of probing (port scanning) with logfile monitoring
·Courtney and Portsentry using for detetction of probing and monitoring data stream even have some primacy. And for using that we could attack the ip address in filter tcpwrapper
·Shadow for SANS from a snort detection pattern from data when passes and if the pattern detected automaticly sent an alert.

Network monitoring also connected with SNMP protocol (Simple Network Management Protocol) can't deny it SNMP first version very often used rather than second version that more ensure to monitoring than first version that very unsafety.

Example from Network Monitoring aktivitas using SNMP is :

·Hp Openview (Windows)
·Packetboy (Windows)
·Packetman (Unix)
·Snmp Collector (Windows)
·Etherboy (Windows)
·Etehrman (Unix)
·Webboy (Windows)

And also there is a Network Monitoring not using SNMP and here the example :

·Netwatch was include a package with Linux Debian .
·Ntop could monitoring network like a top aktivitas that procced in UNIX system.
·Iplog Updlog and icmplog is focus for monitoring package IP, ICMP, and UDP .
·Iptraf was including in a pack of Linux Debian.
·Trafshow can show you way from others hosts in a Text Mode.


1811197palyja-161333810-DMCC780x390780x390.jpg



In the network security architecture section you are also need to know that there are several components in it that are incorporated in the function of the connection between components, and some activities are there and I will describing about

Several components that exist in the network Security Architecture :

·Identity Management
·Authorization System
·Policy Management
·Monitoring System
·Centralized Resource
·Access Control
·Security Operation
·Secure Intranet / Lan
·Physical Security
·Secure Internet

Well maybe just this article about what is in the security of a network both the components of the perangkat lunak program. The monitor that is used and others please enter comments or criticisms about the article that I made waiting for the next article, See yeah.

Network Security Architecture And Security Monitoring Terbaru 2019 Network Security Architecture and Security Monitoring There is a criminal case in a few weeks that's about a internet and ra...

Artikel Terkait

Berikan Komentar

  1. Untuk menulis kode gunakan <i>KODE</i>
  2. Untuk menyisipkan kode ke dalam Syntax Highlighter gunakan <em>KODE YANG LEBIH PANJANG</em>
  3. Kode harus di-parse terlebih dulu agar bisa ditulis.
  4. Centang Notify me untuk mendapatkan notifikasi balasan komentar melalui Email.
histats