Networking security concepts

Wednesday, 4 August 2004, 12:41 PM EST

The key to network security can be found in understanding the choices and strategies available to you look to the building blocks of network security. These include implementing user authentication, using proxy servers and firewalls, setting up demilitarized zones, and taking advantage of port- and packet-filtering technologies. The overview of these security solutions provided by this article will give you an understanding of the technology. User authentication, the first option discussed in this article, is the most basic component of network security, and its success depends on the method used (encrypted, plain text, and so forth), and on the ability to keep this information from unauthorized personnel. Some of the more popular versions of user authentication include the Password Authentication Protocol (PAP) and the Challenge Handshake Authentication Protocol (CHAP).

By Stanley at LinuxExposed.

[ Read more ]




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //