Computer Security
Computer Security
VPN services also help you bypass censorship, get around content blocks, and
unlock website restrictions. By encrypting your internet traffic, VPNs hide your IP
address and physical location, so that no one can tell who you are, where you are,
or what you’re doing online. That’s why VPN means virtual private network —
it’s an on-demand, private tunnel through the internet.
A VPN is private because it encrypts your data and hides your IP address.
IPS technologies have access to packets where they are deployed, either as
Network intrusion detection systems (NIDS), or as Host intrusion detection
systems (HIDS). Network IPS has a larger view of the entire network and can
either deployed inline in the network or offline to the network as a passive sensor
that receives packets from a network TAP or SPAN port.
Firewall
A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization’s previously established security
policies. At its most basic, a firewall is essentially the barrier that sits between a
private internal network and the public Internet. A firewall’s main purpose is to
allow non-threatening traffic in and to keep dangerous traffic out.
Beyond their deployment location, IDS solutions also differ in how they identify
potential intrusions:
Proxy server
Prepared by Amanuel Gezahegn Page 5
Computer security 2023
A proxy server is a system or router that provides a gateway between users and the
internet. Therefore, it helps prevent cyber attackers from entering a private
network. It is a server, referred to as an “intermediary” because it goes between
end-users and the web pages they visit online.
This extra security is also valuable when coupled with a secure web gateway or
other email security products. This way, you can filter traffic according to its level
of safety or how much traffic your network—or individual computers—can handle.
1. Improve security
Residential proxies are well-suited for users who need to verify the ads that go on
their website, so you can block cookies, suspicious or unwanted ads from
competitors or bad actors. Residential proxies are more trustworthy than other
proxy options. However, they often cost more money to use, so users should
carefully analyze whether the benefits are worth the extra investment.
Public Proxy
A public proxy is accessible by anyone free of charge. It works by giving users
access to its IP address, hiding their identity as they visit sites.
Public proxies are best suited for users for whom cost is a major concern and
security and speed are not. Although they are free and easily accessible, they are
often slow because they get bogged down with free users. When you use a public
proxy, you also run an increased risk of having your information accessed by
others on the internet.
Shared Proxy
Shared proxies are used by more than one user at once. They give you access to an
IP address that may be shared by other people, and then you can surf the internet
while appearing to browse from a location of your choice.
Shared proxies are a solid option for people who do not have a lot of money to
spend and do not necessarily need a fast connection. The main advantage of a
shared proxy is its low cost. Because they are shared by others, you may get
blamed for someone else’s bad decisions, which could get you banned from a site.
SSL Proxy
A secure sockets layer (SSL) proxy provides decryption between the client and the
server. As the data is encrypted in both directions, the proxy hides its existence
from both the client and the server.
These proxies are best suited for organizations that need enhanced protection
against threats that the SSL protocol reveals and stops. Because Google prefers
servers that use SSL, an SSL proxy, when used in connection with a website, may
help its search engine ranking. On the downside, content encrypted on an SSL
proxy cannot be cached, so when visiting websites multiple times, you may
experience slower performance than you would otherwise.
Rotating Proxy
A rotating proxy assigns a different IP address to each user that connects to it. As
users connect, they are given an address that is unique from the device that
connected before it.
Rotating proxies are ideal for users who need to do a lot of high-volume,
continuous web scraping. They allow you to return to the same website again and
again anonymously. However, you have to be careful when choosing rotating
proxy services. Some of them contain public or shared proxies that could expose
your data.
Reverse Proxy
Unlike a forward proxy, which sits in front of clients, a reverse proxy is positioned
in front of web servers and forwards requests from a browser to the web servers. It
works by intercepting requests from the user at the network edge of the web server.
It then sends the requests to and receives replies from the origin server.
Reverse proxies are a strong option for popular websites that need to balance the
load of many incoming requests. They can help an organization reduce bandwidth
load because they act like another web server managing incoming requests. The
downside is reverse proxies can potentially expose the HTTP server architecture if
an attacker is able to penetrate it. This means network administrators may have to
beef up or reposition their firewall if they are using a reverse proxy.