0% found this document useful (0 votes)
27 views

Physical Security: 2. Unified Threat Managemen (UTM)

Physical security measures like CCTV, security guards, and locks can help protect a network by denying unauthorized access to facilities and equipment. A unified threat management (UTM) approach provides multiple security functions like firewalls, intrusion detection, and intrusion prevention through a single system. Firewalls monitor and control network traffic based on security rules, intrusion detection identifies suspicious activity, and intrusion prevention blocks threats to the network by assessing packets.

Uploaded by

Adhem Naiji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

Physical Security: 2. Unified Threat Managemen (UTM)

Physical security measures like CCTV, security guards, and locks can help protect a network by denying unauthorized access to facilities and equipment. A unified threat management (UTM) approach provides multiple security functions like firewalls, intrusion detection, and intrusion prevention through a single system. Firewalls monitor and control network traffic based on security rules, intrusion detection identifies suspicious activity, and intrusion prevention blocks threats to the network by assessing packets.

Uploaded by

Adhem Naiji
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Module 4

After learning types of network attacks, we must also know how to


secure a network.
here are some simple things that are useful for protecting the network

1. Physical Security
Physical security describes security measures that are designed to
deny unauthorized access to facilities, equipment and resources
and to protect personnel and property from damage or harm (such
as espionage, theft, or terrorist attacks). Physical security involves
the use of multiple layers of interdependent systems that can
include CCTV surveillance, security guards, protective barriers,
locks, access control, perimeter intrusion detection, deterrent
systems, fire protection, and other systems designed to protect
persons and property.

2. Unified Threat Managemen (UTM)


Unified threat management is an approach to information security
where a single hardware or software installation provides multiple
security functions. UTM must have a minimum of several
converging security features, which is a firewall, Intrusion
detection, Intrusion Prevention.

- Firewall is a computer network security system that functions to


protect computers from various types of attacks from outside
computers. A firewall works by monitoring and controlling all
incoming and outgoing network traffic that you do based on
established security rules.

- IDS ( Intrusion Detection system ) is a methods that can be


used to support suggested activities in the system or network.
- IPS ( Intrusion Prevention System ) is software that works
behind a firewall to identify and block threats to the network by
assessing every packet that passes based on the network
protocol in the application and tracking threats to network
security.

You might also like