Wednesday, November 4, 2020

intrusion occurs in the network

If an intrusion occurs in the network, the network security professionals have very little time in order to react and contain the threat before it can expand and cause any potential harm to the system. To ensure that this reaction time is short, switches and routers become critical points from where data is gathered on problematic behavior, threats or policy violations.
Furthermore, the switches and routers being points of entry can be immediately stopped from denoting any further data into the network itself or its internal components, thereby making these two components increasingly relevant towards protecting a network’s security.
Routers and switches can also be leveraged for initiating preventive protocols for threats by making them crucial data gathering tools for monitoring network traffic.
Internal Threat Detection
While the proliferation of most attacks on a network usually emanates from external data incoming towards the system, the increasing use of data transfer devices like hard disks and USBs make internally generated threats a reality that routers and switches need to protect against as well.
If configured in the right manner, the switch can stop a threat from such a device from spreading further down in the system thereby effectively walling it off and limiting the number of affected network resources to a manageable limit.

More Info: comptia a+ jobs salary

No comments:

Post a Comment