Main body 

One of the most important tools in network security is measuring levels disability and confidentiality of large numbers Network configurations to able to secure them, that can be made by check whether of optimization are weak or strong, allow the administrator to select the relevant option which will be the kay to secure the Network. 

 

                                         (Bing.com 2021) 

Network security, as we all know, is based on the fact, to providing, confidentiality, authentication, and integrity, that participle will represent the network policy, The configuration, and the design is important for network perimeter and the computer security, there are other aspects that are relevant when we talk about security, such intrusion, detention, traffic analyzes and network motoring. 

  There are diverse types of network security such. 

 
. Access control- blocks the access of the unauthorize users and protects the Network from any attack. 

 . Application security- track the accessibility and vulnerabilities and secure the hardware and 

 software. 

. Firewall- this device acts like a filter, decide, it can allow and block traffic. 

 
. Virtual Private Network (VPN}- Secure the communication and the Network in all internets 

space. 

. Intrusion prevention system-Those are type of systems Network that identify also block hackers by scan network traffic. 

There are so many ways to secure a network, the crucial point is choosing the best and most powerful security system, one of them we can mention is the firewall , some of them are design with system of codes witch really achieve elevated levels of satisfaction. 

  The security is made based on traffic and can be applied from LAN zone to the WAN zone or vice versa, the router created a zone for traffic itself and can be made automatically therefore the firewall will figure out and then apply to traffic. 

 

                                                             (Microsoft  2022) 

The authors ralHeberlein,LT; Dias,GV; Levitt,KN; Murkherjee,B; Wood, J and Wolber, D, refer that, "seve Network attack has been simulated and refer to how the monitor has been able to detect those attacks are also analyzed”. 

 


Comments