Some basic suggestion and steps to prevent Attacks and Network security tutorials

  • Use complex password for all devices

  • Install authorized version of virus scanner, scan PCs regularly and update it regularly.

  • Install software or hardware firewall. Use intrusion detection systems/intrusion prevention systems (IDS/lPS) to scan and stop network attacks.

  • Configure port security

  • Disable unused ports.

  • Read system and device logs

  • Subscribe to mailing lists that publicize current software vulnerabilities and attacks.

  • Patch computers and devices regularly.

  • Protocols used to manage network devices, such as Telnet, can be a vulnerable because Telnet sends all session data in clear text. Instead, use Secure Shell (SSH), Secure Socket Layer (SSL), or IPsec.

 

Network Security Process

  • Network security is an ongoing process that continually evolves. Above Figure shows the network security wheel; the four facets are as follows:

 

SECURE

 

    TEST

  • Secure: Involves installing and configuring devices for security.

  • Monitor: After the network has been secured, it must be monitored to ensure security.

  • Test: Involves testing systems to ensure that they function properly.

  • Improve: After monitoring and testing, you might need to improve the security of the network.


 

border