Book Image

Network Security Strategies

By : Aditya Mukherjee
Book Image

Network Security Strategies

By: Aditya Mukherjee

Overview of this book

With advanced cyber attacks severely impacting industry giants and the constantly evolving threat landscape, organizations are adopting complex systems to maintain robust and secure environments. Network Security Strategies will help you get well-versed with the tools and techniques required to protect any network environment against modern cyber threats. You’ll understand how to identify security vulnerabilities across the network and how to effectively use a variety of network security techniques and platforms. Next, the book will show you how to design a robust network that provides top-notch security to protect against traditional and new evolving attacks. With the help of detailed solutions and explanations, you'll be able to monitor networks skillfully and identify potential risks. Finally, the book will cover topics relating to thought leadership and the management aspects of network security. By the end of this network security book, you'll be well-versed in defending your network from threats and be able to consistently maintain operational efficiency, security, and privacy in your environment.
Table of Contents (15 chapters)
1
Section 1: Network Security Concepts, Threats, and Vulnerabilities
5
Section 2: Network Security Testing and Auditing
10
Section 3: Threat Management and Proactive Security Operations

Summary

In this chapter, we have taken a look at the foundational network security concepts and components that form the strong base that's required for a secure network implementation. Post this, we took a step-by-step dive into the various phases of building network security, which are planning and analysis, designing, building, testing, and deployment. In the second half of this chapter, we looked at an optimal NOC setup and its various attributes, such as incident management, monitoring, escalation, and reporting. Lastly, we dug into network security assessments and discussed threat modeling.

By completing this chapter, you now understand that network security is a vast domain that requires a bottom-up approach if we wish to fully understand the minute mechanisms that make it tick. As a security professional, you must have good exposure to the fundamentals of the network and the models and frameworks explained in this chapter while, at the same time, be able to identify and remediate deep-seated technical issues. I highly recommend doing a foundational assessment of the network configuration and reviewing policies and procedures in place in order to incorporate security from the inside out.

In the next chapter, we will take a look at the security concepts of cloud environments and wireless networks. We will look at the major security concerns and the industry best practices that can be considered while building or assessing a cloud environment or wireless networks for an organization.