Lecture # 6
Lecture # 6
Starting from the scratch, let’s see what is meant by HBSS and NBSS before moving on to their
best practices and common issues! Truly speaking, host based and network based security issues
can get tricky to handle
Network security is a system solely made to target all the traffic passing from the Internet to
LAN and vice versa to create a secure infrastructure. It filters out all the users and is found ideal
for the defense of the underlying networking structure from illegal access, misuse, or shoplifting.
For enhanced security purposes of devices, applications, and customers, it guards your data
against intrusions and cyber threats.
Placement:
Work On:
Movement:
Network based security system is not so flexible in terms of mobility. It can only be
moved when all LAN assets are migrated to a new & secure location
HBSS is mobile-friendly as it is implemented on end machine (Computer/ Laptop)
NBSS: Doesn’t offer internal security in end host to end host communication using
similar VLAN
HBSS: It offers maximum communication security control and protection even if
operating in the same zone
Network Protection:
Scalability:
Cost:
NBSS: Lower when it comes to huge enterprise
HBSS: Higher when it comes to huge enterprise
Keep in mind that although host-based and network security are different, they can be used
together to create a more comprehensive security system. Combining these two solutions allows
you to protect more devices than you could with either solution alone.
It highlights the problem of this system is less capable and prone to be compromised by any
cyber-attack. Moreover, they need additional computing power to work correctly.
The signatures are usually outdated, not advanced, and fail to detect Zero-day attacks
Packet inspection seems to act blindly towards encrypted traffic. Besides, it gives tough
time to upgrade
Network monitoring cannot see any host activity or any new processes carried out by the
customer
The removable media cannot be detected
They are not capable of handling switched networks
Network monitoring fails in the department of “log collection”
To ensure the maximum safety and remove host-based and network-based security issues,
always make your password intense and unique, lengthy and unpredictable
Keep a close check on customer’s permissions
Always go for a well-planned and fool-proof security policy
Prefer using Centralized Logging and never miss out on Immediate Log Analysis
Allow a restricted number of users/team members to access the accounts and other
services
To guarantee the best flow of services and task deployment, keep security devices
correctly
Never practice Disabling the Personal Firewalls upon installing HBBS or NBSS
Do not forget to change the default or well-known login accounts on the machine
Quickly disable the accounts or any special services that are not in use anymore
Make visibility your top priority
Use Honeypots and Honeynets
Create and implement the least-privilege principle (feasible for access management and
control)
Never skip the testing of the system’s backups and disaster recovery plan in a consistent
manner, as it is an efficient solution to host-based and network-based security issues
The easiest way to maximize the protection is to use VPNs
Install the IDS (intrusion detection system) correctly
The preferable option is to opt for an automated response to cyber threats
Don’t forget to secure your network equipment physically