Google Cybersecurity -Networks and Network Security

 Network

A network is a group of connected devices.

Data Packet

A data packet is a basic unit of information that travels from one 
device to another within a network. 
When data is sent from one device to another across a network, it is sent as 
a packet that contains information about where the packet is going, where it's 
coming from, and the content of the message
.

VPN

Proxy Server

Proxy servers are an important component of network security. Here's a brief understanding of what proxy servers are and how they work:

  • A proxy server is a dedicated server that sits between the internet and the rest of the network.
  • It acts as an intermediary between clients (users) and other servers on the internet.
  • When a client makes a request to connect to the network, the proxy server determines if the connection request is safe.
  • The proxy server has a public IP address that is different from the private network's IP address, which adds a layer of security by hiding the private network's IP address from malicious actors on the internet.
  • Proxy servers can be used to block unsafe websites that users aren't allowed to access on an organization's network.
  • They can also store frequently requested data in temporary memory, reducing the need to fetch data from internal servers and enhancing security by minimizing contact with the internal server.
  • There are different types of proxy servers that support network security:
    • Forward proxy server: Regulates and restricts a person's access to the internet, hiding their IP address and approving outgoing requests.
    • Reverse proxy server: Regulates and restricts internet access to an internal server, accepting traffic from external parties, approving it, and forwarding it to the internal servers.
    • Email proxy server: Filters spam email by verifying the sender's address, reducing the risk of phishing attacks.

Attacks -Module 3

  • Network interception attacks involve intercepting network traffic to steal information or interfere with transmission.
  • Backdoor attacks exploit weaknesses intentionally left in systems to bypass access controls.

Dos attack

Comments

Popular posts from this blog

The Anatomy of a Backend Request: Layers, Middleware, and Context Explained

Validations and Transformations (Sriniously)

JS - Note