Class 18 Security & VPN
Class 18 Security & VPN
Desktop Security
Desktop security, or endpoint security, focuses on securing individual devices (like desktops,
laptops, and mobile devices) that connect to the network. Here’s how to secure a desktop:
Data Encryption: Ensures data on the device and data shared over the network remain
secure. Windows and macOS provide built-in encryption options (e.g., BitLocker, FileVault).
Physical Security: Involves securing devices against theft and limiting physical access.
Perimeter Security
Perimeter security focuses on protecting the network’s boundary to prevent unauthorized external
access.
Firewalls: Network firewalls monitor and filter traffic between internal and external networks.
They can be configured to allow or block specific types of traffic.
Intrusion Detection and Prevention Systems (IDS/IPS): IDS monitors traffic for suspicious
activity, while IPS blocks potentially dangerous traffic in real-time.
• Virtual Private Network (VPN): Encrypts the connection for remote users accessing the
network, protecting sensitive information even over public networks.
Demilitarized Zone (DMZ): A DMZ is a network segment that separates public-facing servers
(e.g., web servers) from internal resources. It acts as a buffer zone, reducing the risk of direct
attacks on internal systems.
Network Segmentation: Dividing the network into segments helps isolate sensitive areas and
limits the spread of attacks.
Educate Users: Awareness training on identifying phishing attacks, using secure passwords, and
proper use of devices.
Regular Audits and Monitoring: Constantly monitor traffic, review security logs, and perform
vulnerability scans.
• Backup and Recovery Plans: Ensure there are regular backups of critical data and a recovery
plan to restore operations quickly after an attack
VPN
• A Virtual Private Network (VPN) is a technology that creates a secure, encrypted connection
over the internet between your device (like a computer or smartphone) and another network.
• This connection acts like a private tunnel, making it seem as if you’re directly connected to the
network you’re accessing, even if you’re actually far away or using a public Wi-Fi network.
• VPNs are used to protect online privacy, secure data, and access restricted or blocked content.
• Without a VPN, any data you send or receive, like browsing or sending emails, is open for others
on the same network to intercept.
• A VPN hides this data by encrypting it—making it unreadable to anyone who doesn’t have the key
to decrypt it.
How VPN Works?
2. Encryption:
o Once the tunnel is set up, all data sent between your device and the VPN server is encrypted.
This encryption changes your data into a code that’s unreadable to outsiders, keeping your
information safe from hackers or prying eyes on the same network
1. Enhanced Privacy: Hides your IP address and browsing data from trackers and hackers.
2. Accessing Restricted Content: VPNs can allow access to content restricted by region, like certain websites
or streaming services.
3. Security on Public Wi-Fi: Protects your data from being intercepted when using open networks.
4. Remote Work and Secure Access: Allows employees to securely access their company’s network remotely.
Setting Up and Using a VPN
1. Choose a VPN provider (like NordVPN or ExpressVPN) and download their app.
3. Open the VPN app, log in, and choose a server location.