Sie sind auf Seite 1von 29

Internet Basic

The Internet is defined as global computer network providing a variety of


information and communication facilities, consisting multiples interconnected
networks using standardized communication protocols.

Internet refers to a network of networks. In this network, each computer is


recognized by a globally unique address known as IP address.

Evolution

The concept of the Internet was originated in 1969 and has undergone several
technological & Infrastructural changes as discussed below:

1. The origin of the Internet was coined from the concept of Advanced Research
Project Agency Network (ARPANET).

2. ARPANET was developed by United States Department of Defense. The basic


purpose of ARPANET was to provide communication among the various
bodies of government.

3. Initially, there were only four nodes, formally called Hosts.

4. In 1972, the ARPANET spread over the globe with 23 nodes located in
different countries and thus became known as the Internet.

By the time, with the invention of new technologies such as TCP/IP protocols,
DNS, WWW, browsers, scripting languages etc., the Internet provided a
medium to publish and access information over the web.
How the Internet is useful to us

Internet is the best example of change in technology, internet has totally changed
the world, now approximately more than half of the world is connected to internet
no matters what devices you are using a Laptops, smartphones, desktops or by
other handheld devices, It also doesn't matters you are either at home, office,
travelling or so what.

With the ever-increasing usage of Internet, numerous activities have started taking
place in your computer world and it would be either for good or bad. These
activities may vary from identity theft too, stealing private passwords, documents,
and files in simple term a hacking attempt. The fact is that everything is now online
from shopping to banking to paying bills and so on, and opens us to these frauds
and makes us victims unless you have taken the necessary steps to protect your
computer

Here, we will discuss some of the advantages of the Internet:

1. The Internet allows us to communicate with the people sitting in remote


locations. There are various apps available on the web that uses the Internet
as a medium for communication

2. One can surf for any kind of information over the internet. Information
regarding various topics.

3. The Internet also serves a medium for entertainment like- Online Television,
Gaming, Songs & Videos.

4. The Internet allows us to use many services like- Internet Banking, Online
Shopping, Online Ticket Booking, E-mail

5. Most important but not the least internet has provided the concept
of electronic commerce, that allows the use of selling, buying online and
moreover includes the use of online transactions.
How the Internet is harmful to us

Nothing is perfect in this world, everything has its advantages as well as


disadvantages also.

The bad impact of the internet is a cyber attack against organizations or individuals.

You can't judge the impact of loss due to cyber attack.

Losing your data – If your computer has been hacked or infected, there is a big chance
that all your stored data might be taken by the attacker.

Bad usage of your computer resources – This means that your compromised network or
the computer can be used to launch another attack without being coming to your notice like
a DDoS attack.

Reputation loss – Just think if your Facebook account or business email has been
compromised by an unknown cause and is being used to send fake information to your
friends, business partners. You will need time to gain back your reputation, on another hand
if same happened with the e-commerce site where the transaction is involved so that
particular site will take time to gain the trust and reputation back.

Identity theft – This is a case where your identity is stolen (photo, name surname,
address, and credit card) and can be used for a crime like making false identity documents.

Another disadvantage is the Spamming. Spamming corresponds to the unwanted e-mails in


bulk. These e-mails serve no purpose and lead to obstruction of the system.

The virus can easily be spread to the computers connected to the internet. Such virus
attacks may cause your system to crash or your important data may get deleted.
Internet Domain Name System
Domain Name System helps to resolve the hostname to an address.

IP Address

The IP address is a unique logical address assigned to a machine over the


network.
An IP address exhibits the following properties:

1. The IP address is the unique address assigned to each host present on the
Internet.
2. The IP address is 32 bits (4 bytes) long.

IP address consists of two components: network component and host


component. Each of the 4 bytes is represented by a number from 0 to 255,
separated by dots. For example 137.132.4.184

Uniform Resource Locator (URL)

Uniform Resource Locator (URL) refers to a web address which uniquely


identifies a document over the internet.

This document can be a web page, image, audio, video or anything else present on
the web.

For example,
www.XXXX.com/internet_technology/index.html
is an URL which is stored on XXXX web server under the internet_technology
directory.

There are two forms of URL as listed below:

1. Absolute URL
2. Relative URL
Domain Names

Domain Name is a symbolic string associated with an IP address. There are several
domain names available; some of them are generic such as com, edu, gov, net etc,
while some country level domain names such as a, in, za, etc.

The following table shows the Generic Top-Level Domain names:

Domain Name Meaning

Com Commercial business

Edu Education

Gov U.S. government agency

Int International entity

Mil U.S. military

Net Networking organization

Org Nonprofit organization

The following table shows the Country top-level domain names:

Domain Name Meaning

Au Australia

in India

cl Chile

fr France

us United States

za South Africa

UK United Kingdom

jp Japan

es Spain

de Germany

ca Canada

ee Estonia

HK Hong Kong
Services over Internet
Communication Services

There are various Communication Services available that offer exchange of


information with individuals or groups over the internet. The following table gives a
brief introduction to these services:

S.N. Service Description

Electronic Mail
1
Used to send an electronic message over the internet.

Telnet
2
Used to log on to a remote computer that is attached to the internet.

Newsgroup
3
Offers a forum for people to discuss topics of common interests.

Internet Relay Chat (IRC)


4
Allows the people from all over the world to communicate in real time.

Mailing Lists
5 Used to organize a group of internet users to share common information
through e-mail.

Internet Telephony (VoIP)


6 Allows the internet users to talk across the internet to any PC equipped to
receive the call, Eg. CISCO Phone.

Instant Messaging
7 Offers real-time chat between individuals and group of people. Eg. Yahoo
Messenger, WhatsApp, Facebook Messenger, Telegram, WeChat.

Video conferencing
Video conferencing or Video teleconferencing is a method of communicating by
8
two-way video and audio transmission with help of telecommunication
technologies.
Information Retrieval Services

There exist several Information retrieval services offering easy access to


information present on the internet. The following table gives a brief introduction to
these services:

S.N. Service Description

File Transfer Protocol (FTP)


1
Enable the users to transfer files.

Archie
2 It’s updated the database of public FTP sites and their content. It helps to
search a file by its name.

World Wide Web

The World Wide Web is a way of accessing information over the medium of the
Internet. It is an information-sharing model. The Web uses the HTTP protocol, to
transmit data. Web services, which use HTTP to allow applications to communicate.
The Web also utilizes browsers, such as Internet Explorer or Firefox, to access
Web documents called Web pages that are linked to each other via
hyperlinks. Web documents also contain graphics, sounds, text, and video.
Internet Service Providers (ISP)
Internet Service Provider (ISP) is a company offering access to the internet.
They offer various services:

1. Internet Access.

List of internet service providers in India

Some of the big and small ISP's offering internet services in India are:-

 Airtel
 Vodafone
 Idea
 Reliance Communications
 BSNL
 Aircel
 Tata Teleservices
 MTNL
 DEN Networks
 Hathway
 Spectranet
 Tikona
 ACT

Internet Protocols
There are only 2 protocols on basis of which the communication takes place over
the internet. First is TCP (Transmission Control Protocol), Second is UDP (User
Datagram Protocol).

Transmission Control Protocol

TCP is a connection-oriented protocol and offers end-to-end packet delivery. It acts


as a backbone for connection. It exhibits the following key features:

 TCP ensures reliability by sequencing bytes with a forwarding


acknowledgment number that indicates to the destination the next byte the
source expects to receive.

 The full-duplex operation allows both-way communication simultaneously.


Example:- Mobile, Telephone communication.
UDP (User Datagram Protocol).

UDP is connectionless and unreliable protocol. It doesn’t require making a


connection with the host to exchange data. Since UDP is unreliable protocol, there
is no mechanism for ensuring that data sent is received.

Example:- Voice Over IP.

Common TCP/IP Protocols and Ports

Protocol TCP/UDP Port Number

File Transfer TCP 20/21


Protocol (FTP)

Secure Shell (SSH) TCP 22

Telnet TCP 23

Simple Mail Transfer TCP 25


Protocol (SMTP)

Domain Name TCP/UDP 53


System (DNS)

Dynamic Host UDP 67/68


Configuration
Protocol (DHCP)

Trivial File Transfer UDP 69


Protocol (TFTP)
Hypertext Transfer TCP 80
Protocol (HTTP)

Post Office Protocol TCP 110


(POP) version 3

Network Time UDP 123


Protocol (NTP)

Internet Message TCP 143


Access Protocol
(IMAP)

Simple Network TCP/UDP 161/162


Management
Protocol (SNMP)

Lightweight TCP 179


Directory Access
Protocol (LDAP)

Hypertext Transfer TCP/UDP 389


Protocol over
SSL/TLS (HTTPS)
Email Overview
Email or Electronic mail is a service which allows us to send/receive the message in
electronic form over the internet. It offers an efficient, inexpensive mean of
distributing information among people no matters at what part of the world they
are and what devices they are using.

Each user of email is assigned a unique name for his/her email account. This name
is known as an E-mail address. Different users can send and receive messages
according to the e-mail address.

E-mail is generally of the form username@domainname. For example,


prateeknagpal08@gmail.com is an e-mail address where prateeknagpal08 is
the username and gmail.com is domain name offered by Google free of cost.

 The username and the domain name are separated by @ symbol.


 E-mail addresses are not case sensitive.
 Spaces are not allowed in e-mail address.

E-mail Message Components

E-mail message comprises of different components: E-mail Header, Text, and


Signature.

E-mail Header:- The first five lines of an E-mail message is called E-mail header.
The header part comprises of following fields:

 From
 Date
 To
 Subject
 CC & BCC
Difference between CC & BCC

 CC stands for Carbon copy. It includes those recipient addresses whom we


want to keep informed but not exactly the intended recipient.

 BCC stands for Black Carbon Copy. It is used when we do not want one or
more of the recipients to know that someone else was copied on the
message.

TEXT/Message Part/Main Body.

 It represents the actual content of the message.

SIGNATURE

 This is the final part of an e-mail message. It includes Name of Sender,


Address, and Contact Number.

Advantages

E-mail has proved to be powerful and reliable medium of communication. Here are
the benefits of E-mail:

 Reliable
 Convenience
 Speed
 Inexpensive

Disadvantages

Apart from several benefits of E-mail, there also exists some disadvantages as
discussed below:

 Forgery
 Overload of the mailbox by either Junk/spam emails from advertising
agencies or from others.
 Phishing mail
Email protocols

E-mail Protocols are set of rules that help the client to properly transmit the
information to or from the mail server. Here in this tutorial, we will discuss various
protocols such as SMTP, POP, and IMAP.

Comparison between POP and IMAP

S.N. POP IMAP

Generally used to support the single


1 Designed to handle multiple clients.
client.

Messages are accessed online


2 Messages are accessed offline. although it also supports offline
mode.

All the messages have to be downloaded It allows transfer of messages to the


3
on a local client from the server. client.

Only one mailbox can be created on the Multiple mailboxes can be created on
4
server. the server.

Mails once downloaded cannot be Allows emails to be accessed from


5
accessed from some other location. multiple locations.

IMAP requires more internet usage


6 POP requires less internet usage time.
time.

7 Microsoft Outlook (Exchange). Gmail, Yahoo mail.


E-mail System

E-mail system comprises of the following three components:

 Mailer
 Mail Server
 Mailbox

Mailer

It is also called mail program, mail application or mail client. It allows us to


manage, read and compose an e-mail.

Mail Server

The function of the mail server is to receive, store and deliver the email. It is
must for mail servers to be running all the time and must have to be robust in
order to handle a heavy traffic flow because if it crashes or is down, email can be
lost.

Mailboxes

Mailbox is generally a folder that contains emails and information about them.

It’s good to archive your emails from time to time so that by any unknown cause
your system got infected by a virus is not working and the system got formatted at
least you may have the mail back if you have archived it.
There are several email service providers available in the market providing an
email.

The following table shows the popular email service providers:

S.N. Service and Description

1. Gmail by Google.

2. Hotmail by Microsoft.

3. Yahoo Mail by Yahoo.

4. icloud Mail by Apple.

ATM Mail
5.
ATM Mail is a free email service with good spam protection.

6. Mail.com and GMX Mail (www.gmx.com/mail/)

7. Short mail

8. Inbox.com

9. My Way Mail
Website Overview
The website is a set of related web pages, is hosted on a web server and is
accessed using Uniform Resource Locator (URL's).

Websites can either be dynamic or static.

Static websites
They are also known as stationary websites. Static websites are created using only
HTML.

Dynamic websites show different information at the different point in time. It has
been made possible using Ajax technology.

AJAX is a new technique for creating better, faster, and more interactive web
applications with the help of XML, HTML, CSS, and JavaScript.

Both websites work on the client-server model.

Prerequisites for Website Publishing

In order to publish your site, you need the following things:

 Web development software


 Internet Connection
 Web Server

Web development software


It is used for building web pages for your website. Dreamweaver and Word
Press are an example of web development software.

Internet Connection
Internet connection is required to connect to a remotely located web server.

Web Server
Web server is the actual location where your website resides on or where the sites
are hosted on. A web server may host single or multiple sites depending on what
hosting service you have paid for.
Domain Name

A domain name is the part of URL that comes after "www".

A care should be taken to select a domain name. Your domain name should be easy
to remember and easy to type.

Domain Extensions

The following table shows the top-Level Domain extensions:

Domain Meaning

.com Commercial Business

.edu Education

.gov U.S. government agency

.int International Entity

.mil U.S. military

.net Networking organization

.org Nonprofit organization

Web hosting

Web server is the actual location where your website resides on or where the sites
are hosted on

You a need a web server in order to host your website's. Now some of the
organizations like:- small or startups they are interested in order to spend a lot in
having their dedicated server on their premises for hosting a site, so for that they
contacts to a large organizations which provides a space on their servers to small
companies to host a sites thus charging them for that space either monthly or
yearly bases. Web hosting is a service of providing online space for storage of web
pages. These web pages are made available via World Wide Web. The companies
which offer website hosting are known as Web hosts.
The servers on which website is hosted remain switched on 24 x7. These servers
are run by web hosting companies. Each server has its own IP address. Since IP
addresses are difficult to remember, therefore, webmaster points their domain
name to the IP address of the server their website is stored on.

It is not possible to host your website on your local computer, to do so you would
have to leave your computer on 24 hours a day. This is not practical and cheaper as
well. This is where web hosting companies come in.

Types of Hosting

The following table describes different types of hosting that can be availed as per
the need:

S.N. Posting Description

Shared Hosting
In shared hosting, the hosting company puts thousand of the website on the
1.
same physical server. Each customer has their own allocation of physical web
space and a set of bandwidth limit.

Dedicated Server
2. In this kind of hosting, the single dedicated server is set up for just one
customer.

Reseller Hosting
3. A reseller acts as a middleman and sells hosting space of someone else’s
server.

Grid Hosting
Instead of utilizing one server, Grid Hosting spreads resources over a large
4.
number of servers. It is quite stable and flexible. The servers can be added or
taken away from the grid without crashing the system.
Web Hosting Companies

Following are the several companies offering web hosting service:

S.N. Hosting Company

1. Blue Host

2. Go, Daddy

3. Host Gator and Big Rock

Web Browser

web Browser is an application that allows us to view and explore information on


the web. We can request for any web page by just entering a URL into address bar.

Earlier the web browsers were text-based while now a day's voice-based web
browsers are also available. Following are the most common web browser available
today:

Browser Vendor

Internet Explorer Microsoft

Google Chrome Google

Mozilla Firefox Mozilla

Netscape Navigator Netscape Communications Corp.

Opera Opera Software

Safari Apple
Search Engines & SEO
In order to Search something from the huge database information over the
internet, we need search engines for the search purpose.

Users can search for any information by passing the query in form of keywords or
phrase. It then searches for relevant information in its database and returns
relevant result to the user.

Examples

Following are the several search engines available today:

Search Engine Description

Google By Google.

Bing by Microsoft.

Ask

Search Engine Optimization

Search Engine Optimization is a methodology of strategies, techniques, and


tactics used to increase the number of visitors to a website by obtaining a high-
ranking placement in the search results page of a search engine (SERP)
Social Networking
Social Networking refers to share thoughts, interests, and activities with the group
of individuals or organizations together via some medium.

There are several web-based services are available which offer easy to interact
interface to connect with people within the world. There are also several mobile-
based services in for of apps such as WhatsApp, Hike, Line, vibe etc.

Available Social networking Services

S.N. Service Description

1. Facebook.

2. Twitter

3. LinkedIn

4. Flicker

5. WhatsApp

6. Hike
Internet Security
With the ever-increasing usage of Internet, numerous activities started taking place
in computer and networking world and it can be either for good or bad. These
activities vary from identity theft too, stealing private passwords, documents
and files all are the forms of hacking attempts. The fact is that everything is
now online thus makes us victims, we have to take the necessary steps to protect
your computer.

Simply we want to secure the computers, computer networks, computers peripheral


devices and other electronic communication devices, we have to take care of both
the physical security of the devices as well as the security of information being
passed through devices and traveling across the computer networks from one
device to another.

Types of Internet attacks

The attacks can be either against operating system, Applications or against a whole
network.

Operating System Attack.


1. OS vulnerability.
2. Bugs.
3. Unpatched OS.

Application Level Attack.


1. Cross Site Scripting.
2. SQL injection.
3. Phishing.
4. Session Hijacking.
5. Man-In-Middle Attack.

Network Level Attack.


1. Denial Of Service Attack.
2. IP Spoofing.
Internet security threats/attacks

Internet Security Threats impacts the network, data security, and other internet
connected systems. Cybercriminals have evolved several techniques to treat
privacy and integrity of bank accounts, businesses, and organizations.

Following are some of the internet security threats:

 Worms
 Malware
 Spam, Phishing

Potential Losses due to Security Attacks

You can judge the impact of loss due to cyber attack.

 Losing your data – If your computer has been hacked or infected, there is
a big chance that all your stored data might be taken by the attacker.

 Bad usage of your computer resources – This means that your


compromised network or
 the computer can be used to launch another attack without being coming to
your notice like a DDoS attack.

 Reputation loss – Just think if your Facebook account or business email has
been compromised by an unknown cause and is being used to send fake
information to your friends,
 business partners. You will need time to gain back your reputation, on
another hand if same happened with the e-commerce site where the
transaction is involved so that particular site will take time to gain the trust
and reputation back.

 Identity theft – This is a case where your identity is stolen (photo, name
surname, address, and credit card) and can be used for a crime like making
false identity documents.
Basic Computer Security Checklist

With small things, we can prevent our computer, computer networks, other
resources from being compromised

1. Always keep systems, other devices in a network or home password


protected.

2. Always lock your system before leaving your desk.

3. Keep your desk clear not to stick your credential on the desk.

4. Not alow using your workstation in your absence.

5. As the home user does check if the operating system is being updated with
latest security patch and antivirus because in the organization the IT staff are
there to take care of it.

6. Don't ever install freeware, games as by doing this you can harm yourself.

7. Don't open the mail that is claiming it from the bank with the subject
"congrats you have Pre-Qualified personal Loan offer of RS. 750000
at 12.99% from yes bank" or some with some other subject and forcing
you to provide your personal details by clicking on the link within the
message, beware the link can be a malicious and can redirect to some
infected sites or virus can get into your system.

8. Check for the unusual services running that consumes resources.

9. Take a backup on a regular interval of time, so that the data can be restored
if the computer or network suffers from a cyber attack.

10.Don't provide the user's account with administrative or full privileges.

11.Limit the access to the use of internet in office's or organization.

12.Disconnect all the shared resources from the computer which is more longer
in need.

13.Computer Application White listening: Only install the applications that


are needed at the personal end or needed for work department wise in an
organization that to original genuine.

14.Block Disk and Removable media: The idea is to block the use of CD, USB
or other removable media by blocking the ports and CD roam from the
server.
15.For the organization, it is recommended to use full encryption and 2FA (Two
Factor Authentication) method to protect the critical data. Windows has it's
inbuilt encryption solution (BitLocker Drive Encryption) by turning it on
you safely transfer your data by using USB stick because at another end
when you need to fetch the data from USB you need a password for that.

16.Disable Autorun & Autostart for windows.The Autorun & Autostart is


another way to infect a system while having physical access. Autorun
is windows in build feature that if enable allows the executable (.exe)
files to run automatically when a user inserts a DVD/CD in a DVD_ROM tray
or when the USB device is inserted. The attacker can make the use of this to
run a malware. Many people are not aware of this risk featured that’s why
their machines are always vulnerable to Autorun malware.

The following is the content of Autorun.inf:

[autorun]
Open=setup.exe

How to turn off Autorun functionality:

1. Go to run.
2. Type gpedit.msc
3. If the prompt for the administrator password provide it and click allow. Under
the Computer Configuration, expand Administrative Templates, expand
Windows Components and then click Turn off Autoplay Policies.
4. On in the right side double click to Turn off Autoplay.
5. Click Enabled and then select all drives in order to disable the Autorun on all
drives.
6. Restart the computer.
Security Products

Antivirus or Malware Scanner.

Antivirus is must for defense against any malware attack, Without this software,
there is a high chance that your systems and networks can be hit and can suffer
from hacking attacks and also can be affected by the various viruses. It is
important that the antivirus scan engine and virus signatures to be updated
regularly, we do this because if your system is hit by the latest malware it will be
detected.

How Antivirus Works?

Antivirus software scans each file in a system comparing each bit of code against
information in its database and if it finds a pattern duplicating one in the database,
it is considered a virus, and it will quarantine or delete that particular file, thus
allowing other files and marking them as safe.

All program files (executable) that enter a system go through the antivirus scan.
Those that match the signatures are classified as viruses and are blacklisted. The
other program files are allowed entry and would run in the system. Antivirus
software depends on the virus definitions to identify malware. That is the reason it
updates on the new viruses definitions. Malware definitions contain signatures for
any new viruses and other malware that has been classified as wild. If the antivirus
software scans any application or file and if it finds the file infected by a malware
that is similar to the malware in the malware definition. Then antivirus software
terminates the file from executing pushing it to the quarantine. DAT files contain
virus signatures and other information that anti-virus products use to protect your
computer against existing and new potential threats. DAT files are released on a
daily basis.

How to get rid of malware?

1. Signature-based detection
2. Behavioral-based detection

Signature-based detection

This is most common in Traditional antivirus software that checks all the.EXE files
and validates it with the known list of viruses and other types of malware. or it
checks if the unknown executable files show any misbehavior as a sign of unknown
viruses.

It is always advisable to use on access scanning because it is complex to remove


malware once it infects your system

Behavioral-based detection
This type of detection is used in Intrusion Detection mechanism. This concentrates
more on detecting the characteristics of the malware during execution. This
mechanism detects malware only while the malware performs malware actions.

Updating antivirus is critical for the security of any system. This is because
any system gets constantly threatened and attacked by new viruses every day.
Antivirus updates would have latest definition files that are needed to identify and
combat new viruses.
Online Virus Testing

If you don't have antivirus installed on your system but you need to scan a file
which you got through the mail, I recommend using the online testing antivirus
engine which is one of the best – https://virustotal.com/.

It is a free and independent service. It uses multiple antivirus engines (58 anti-
virus
engines), so its result will be shown for all the 58 engines. It updates the engines in
real-time.

Please see the following screenshot, wherein I uploaded a file with a virus and the
result is 3/54 (Detection Ratio), which means that it has a virus and did not pass
the class, so it should not be opened.

A good feature of this site is URL checking, before entering to a website you can
enter the
URL and it checks for you if the site has an infection and can harm you. I did a test
with a URL and it came out to be clean and that too 100%, so I can visit it without
my computer being infected.
My recommendation is to use the paid version of antivirus, as free versions of anti-
viruses have nearly identical malware detection scores to the paid versions
produced by the same company.

You can get a review which is the best top rated free antivirus at the moment.

http://in.pcmag.com/antivirus-from-pc-ma/37090/guide/the-best-free-
antivirus-protection-of-2018

The main objective of this section is to provide you the knowledge about various
types of malware. This topic will cover Trojans, Virus, backdoor, worms and the
way they work, spreads to the system from the internet, their symptoms and their
effects. This section will also guide and tell you how to protect the devices and
assets from malware infection.

Firewalls

They can either be software or hardware appliance which operate at the network
level. They protect networks by limiting the access to the internet, they actually
inspect each and every packet that leave the networks and packets that get into
the network. The security administrator actually sets up the set of rules if the
packets match the preconfigured rules the rule will trigger and the block action will
take place, if no rule is triggered then packets are passed i.e. packets are allowed
either to get in to the network or to get out from network, Their position is
generally behind a router or in front of the router depending on the network
topologies. They work as packet filters this means that the firewall takes the
decisions to forward or not the packet based on source and destination addresses
and ports.

Some of the recommended brands are –

1. Cisco ASA Series


2. Checkpoint
3. Fortinet
4. Juniper
5. SonicWALL

SIEM

Security Information & Event Management (SIEM) is a way to approach the IT


security management that provides a holistic view of organization’s information
technology. SIEM system collects logs and other security-related documents for
analysis. Advanced Persistent Threats have led SMEs and Startups to look at the
advantages of SIEM managed security service provider can offer.
Some of the recommended brands are –

1. McAfee.
2. Splunk.

Unified Threat Management (UTM)

Unified Threat Management (UTM) or Unified Security Management protection


is a solution in the Network Security industry, it has become primary network
defense solution for organizations. Complete UTM Protection represents all-in-one
security solution that consists of a variety of security capabilities including Firewall,
Anti-virus, Anti-Spam, Intrusion prevention, content filtering, bandwidth
management, application control.

Das könnte Ihnen auch gefallen