About This Chapter
Network Area Security - Chapter Summary
This chapter's engaging lessons provide a complete overview of network area security. Whether you know a little or a lot about firewalls, SSH proxy tunnels or unified threat management (UTM), this chapter can help strengthen your knowledge. Explore the lessons at the pace that works for you, and use the accompanying quizzes to find out how much you comprehend. Any questions that arise during your studies can be submitted to our experts via the Dashboard. Enjoy around-the-clock access to this chapter via any smartphone, tablet or computer. Upon completion, you will be ready to do the following:
- Explain the role and use of a firewall in network security
- Discuss features and functions of firewalls in network security
- Define and describe SSH proxy tunnels
- List methods and tools of data loss prevention (DLP)
- Discuss intrusion detection systems (IDS) in data security
- Share the definition and types of intrusion prevention systems (IPS)
- Provide the definition of unified threat management (UTM)
1. What is a Firewall in Network Security? - Role & Use
The network firewall is an important piece of equipment that protects your network from hackers and other cyber criminals. Its use is essential if your business is connected to the Internet, and it's highly recommended for residential users too.
2. Firewalls in Network Security: Features & Functions
Firewalls operate as a type of fence to protect what's coming into and leaving your network. In this lesson, you'll learn more about their functionality and some features that are common in today's firewalls.
3. SSH Proxy Tunnels
In this lesson, we will examine what proxy tunneling is all about and understand what SSH proxy tunneling is. We will examine the three main uses of SSH proxy tunnels.
4. Data Loss Prevention (DLP): Methods & Tools
The lesson will discuss how cyber security professionals utilize data loss prevention (DLP) concepts and techniques, like honeypots and honeynets, for the purpose of ensuring the confidentiality and integrity of data.
5. Intrusion Detection Systems (IDS) in Data Security
In this lesson, we'll take a look at data security, what it is, what intrusion detection systems are, some types of intrusion detection systems, and some methods used for intrusion detection.
6. Intrusion Prevention System (IPS): Definition & Types
An intrusion prevention system is an added layer of protection for your computer network. In this lesson, you'll learn more about this system, how it works, and what it does to safeguard your network.
7. What is Unified Threat Management (UTM)?
Unified Threat Management is an evolutionary step in firewall and network security technology. It helps to increase network security by making it easier and less costly. We'll learn about what it is and its benefits in this lesson.
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 203: Defensive Security course
- Introduction to Defensive Security
- Malicious Software Overview
- Networking Threats
- Risk Assessment & Vulnerability Management
- Network Auditing & Monitoring
- Computer Hardware Security
- Media & Mobile Network Security
- Access Control Methods & Models
- Physical Data Security & Authentication Models
- Operating System & Virtualization Security
- Computer Application & Programming Security
- Network Security Design
- Encryption & Hashing
- Methods of Secure Online Communication
- Failure Tolerance & Disaster Recovery
- Social Engineering & Organizational Policies