Site icon Tutorial

Security tools for authentication and authorization

Certify and Increase Opportunity.
Be
Govt. Certified E-Commerce Professional

Security tools for authentication and authorization

Various security technologies and tools are used to secure information moving on internet and which usually includes

Cryptography

Cryptography is the practice and study of encryption and decryption — encoding data so it can only be decoded by intended recipients and rendered unreadable for others. There are two forms of encryption which are symmetric and asymmetric.

Firewall

It is a software or hardware-based security mechanism which controls the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a rule set. A firewall establishes a barrier between two networks i.e. a trusted, secure internal network usually LAN and another network usually the Internet or WAN.

There are several types of firewall

DMZ

DMZ or Demilitarized Zone also called as perimeter network is a physical or logical sub-network that contains and exposes an organization’s external-facing services to WAN or internet. It is used to offer a significant amount of services to the external network. You place the externally accessible servers in a demilitarized zone (DMZ) surrounded by firewalls on either side of the network. You configure the inner firewall more restrictively than the other firewall. Any communication from the external network to the internal network happens only through the servers deployed in the DMZ.

VPN

VPN or Virtual Private Network, is a private network that usually the Internet to connect remote sites or users together.  It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network.

A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunneling Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a “tunnel” that cannot be “entered” by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses.

VPN is classified by

Exit mobile version