Network,Access,System,for,Opti computer Network Access System for Optimum Security
Gone are those times when the companies and the organisations didn't need a hi-tech system to handle them. Owing to the considerable increase in the business sector and thus, an enormous increase in the complexity of the organisational struc ----------------------------------------------------------Permission is granted for the below article to forward,reprint, distribute, use for ezine, newsletter, website,offer as free bonus or part of a product for sale as longas no changes a
TheRome Laboratory, known as the main command and research facility ofthe US Air Force, faced more than 100 intrusions by unknown hackersin 1994. The laboratorys networking systems were accessed usingTrojan horse viruses. The hackers were so successful that theyeliminated all traces of their actions. Thanksto advancements in technology, many devices help us detect andprevent such activities at the earliest from out computer networks. Anetworkaccess systemrepresents a category of devices that can be connected the network tomonitor the traffic, including:networktapsRMONprobesnetworkintrusion detection systemsVoIPrecordingpacketsniffersNetworkAccess System: TypesBeloware some types of network access systems: IntrusionDetection System:Network Intrusion Detection System or NIDS is a network securitydevice that monitors the network for any malicious code or attack. By installing a NIDS device on your network, you can check the datapackets flowing in and out of networks. However, a NIDS device canonly detect the intrusion as and when it occurs and is not capable ofpreventing the attack.IntrusionPrevention System:The main task of an intrusionprevention system or IPS is to promote network security. Consideredan extension of NIDS, it does this by monitoring whether anymalicious activity is taking place on the network on real-time basis.IPS not only detects these unwanted behaviors on the network but alsoblocks them. It operates in-line without interrupting the normal flowof data to prevent attacks by dropping the malicious packets. RMON(technology):Remote Network Monitoring or RMON operates in a client/server model.It enables network administrators to monitor and troubleshoot a groupof local area networks by providing them with standard information.Monitoring devices called probes support RMON as they containRMON software agents. These agents facilitate information collectionand packet analysis. The types of information that a RMON can collectincludes statistics by host, bytes sent, packets sent, packetsdropped and certain other events. PortMirroring:Also calledSPAN(Switched Port Analyzer), port mirroring is used on a network switchto monitor network traffic. It does this by communicating with anetworkmonitoring connection, such as Intrusion Detection System (IDS). Itsends a copy of all network packets existing on a port or even onVLAN for checking to IDS on another switch port. Almost everyenterprise class switch supports port mirroring. It enables networkadministrators and security analyst to see a network traffic that isnot generally visible.Optfor a company that offers the following types of network taps:BreakoutAggregation/RegenerationV-Line(By-Pass)SmartNetwork Access 1 GigabitSmartNetwork Access 10 Gigabit
Network,Access,System,for,Opti