| Article | Rating | Date |
|---|---|---|
|
HTTPS content inspection is the process in which the entire content that is transmitted over SSL channel is scanned for malicious elements, and checked against configured policies before allowing or denying the content to pass through the gateway and enter into the network. Unlike Deep Packet Inspection (DPI) where each packet is inspected for malware, spyware, etc., in HTTPS content inspection the entire payload is scanned and verified to be trusted before making it available to the requesting party. The process of HTTPS content inspection ensures that no harmful and inappropriate information enters into the network, even if requested by any internal computer. https |
12/07/2012 | |
|
Application control is a process in which security administrators can limit or completely restrict users’ access to unwanted/untrusted applications. Some application control systems also allow security administrators to configure the control settings even granularly so that an application can be made available to some users, while restricting the access to same application for other users. Application Control |
12/07/2012 | |
|
Demilitarized Zone (DMZ), sometimes also referred to as Perimeter Network, is a small network of few computers, and lies between the external untrusted network (mostly the Internet) and the internal network (local area network) that contains sensitive data which cannot be exposed to unauthorized people at any cost. DMZ |
31/10/2012 | |
|
Firewall rules are the set of instructions defined by security administrator in an organization. Firewall rules are defined for inbound and outbound network traffics individually, and are used to allow or deny the packets on the basis of their services, user accounts, protocols, port numbers, source addresses, destination addresses, etc. Firewall Rules |
31/10/2012 | |
|
Logs are important aspect of any network architecture in a way that with the help of logs, administrators can diagnose and analyze the cause of any trouble that may occur. Like firewall installation and configuration, monitoring firewall logs also require in-depth knowledge of ports, protocols and other network related technicalities. Therefore, it is recommended that only highly skilled security professionals with ample experience must be hired to manage the firewalls and monitor their logs. firewall logs |
31/10/2012 | |
|
In most organizations nowadays, administrators limit users’ access to the Internet in order to reduce the chances of opening surfaces for the intruders, reduce the chances virus infections, preserve Internet bandwidth and prevent users from accessing inappropriate pages. 5 of the most commonly used ways to control Internet access in an organization are listed in this article access control , DHCP |
31/10/2012 | |
|
Network Address Translation (NAT) is a process handled by a device, typically a router, in which unregistered (private) IP addresses in a local area network are mapped with registered (pubic) IP addresses that an organization may have. Since NAT is widely used in almost all SOHO networks and small, medium and large scale industries, addressing scheme must be chosen wisely before implementing any type of NAT configuration. NAT , Implementation |
31/10/2012 |