Before an attacker touches your data, they move through your network. Understanding how that movement works and how to stop it, is where serious security starts.
Network security is the practice of controlling who and what can enter, move through, and exit your network
3 Pillars of Network Security
All network attacks, even the most advanced, take advantage of one or more of these three vulnerabilities.
Attackers act as man-in-the-middle between two entities communicating, and the attackers read, capture, and modify the traffic. This is far easier to accomplish than most people realize due to unencrypted traffic, weak protocols, and unsecured wireless networks.
The worst attacks don’t make themselves known. An intruder compromises a single node within your environment and then silently penetrates your network depth, performing reconnaissance, horizontal movement, privilege escalation, and staging before anyone sees.
Monitors network traffic for suspicious patterns and either alerts on them or blocks them automatically.
Divides your network into isolated zones so a breach in one area can’t freely reach the rest.
Protects the domain resolution layer, a frequently overlooked vector for hijacking and data exfiltration.