Explain the types of security tools in E-Security.
Answers
1. Firewalls
A firewall is the first (of many) layers of defense against malware, viruses and other threats. It scrutinizes and filters both incoming and outgoing data. Users can also customize rules and policies based on their needs. For example, it’s often necessary to create exceptions that allow certain apps to pass through the firewall so that they don’t constantly trigger false alarms.
2. Antivirus Software
Signature-based antivirus software scans files (from any source) to make sure that there aren’t any hidden threats. And if it finds something shady or scary, it can often remove or quarantine the affected file. While antivirus software certainly isn’t bulletproof — especially when it comes to zero-day threats (i.e. vulnerabilities that hackers have found before software vendors have a chance to patch them and/or users have a chance to install updates) — it’s still a critical piece of the cyber security puzzle. There are many options to choose from that range in price from free to hundreds of dollars a year.
3. Anti-Spyware Software
As the term implies, spyware secretly snoops on victims to see where they go online and, even more so, what they type — such as usernames and passwords, and any other confidential or personal data. That’s where anti-spyware software fights back by (ideally) detecting and removing threats such as key loggers, password recorders, and so on.
4. Password Management Software
Good password management software not only saves a great deal of time, but it strengthens security and prevents major mistakes, such as saving passwords in web browsers.
5. INTRUSION DETECTION AND PREVENTION SYSTEMS
IDS and IPS tools help IT staff identify and protect their wired and wireless networks against several security threat types. These technologies, like several other categories of network security tools, are being deployed with greater frequency as networks grow in size and complexity.
6. ANTI-MALWARE
Anti-malware network tools help administrators identify, block and remove malware. They enable the IT department to tailor its anti-malware policies to identify known and unknown malware sources, for example, or surveil specific users and groups.
7. MOBILE DEVICE MANAGEMENT
MDM software bolsters network security through remote monitoring and control of security configurations, policy enforcement and patch pushes to mobile devices.
8. NETWORK ACCESS CONTROL
NAC products enforce security policy by granting only security policy–compliant devices access to network assets. They handle access authentication and authorization functions and can even control the data that specific users access, based on their ability to recognize users, their devices and their network roles.
9. NEXT-GENERATION FIREWALLS
10. AUTHENTICATION AND AUTHORIZATION