eLanka

Saturday, 18 Oct 2025
  • Home
  • Read History
  • Articles
    • eLanka Journalists
  • Events
  • Useful links
    • Obituaries
    • Seeking to Contact
    • eLanka Newsletters
    • Weekly Events and Advertisements
    • eLanka Testimonials
    • Sri Lanka Newspapers
    • Sri Lanka TV LIVE
    • Sri Lanka Radio
    • eLanka Recepies
  • Gallery
  • Contact
Newsletter
  • eLanka Weddings
  • Property
  • eLanka Shop
  • Business Directory
eLankaeLanka
Font ResizerAa
Search
  • Home
  • Read History
  • Articles
    • eLanka Journalists
  • Events
  • Useful links
    • Obituaries
    • Seeking to Contact
    • eLanka Newsletters
    • Weekly Events and Advertisements
    • eLanka Testimonials
    • Sri Lanka Newspapers
    • Sri Lanka TV LIVE
    • Sri Lanka Radio
    • eLanka Recepies
  • Gallery
  • Contact
Follow US
© 2005 – 2025 eLanka Pty Ltd. All Rights Reserved.
Home » Blog » Articles » Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe
Aditya AbeysingheArticles

Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe

eLanka admin
Last updated: June 19, 2021 2:43 am
By
eLanka admin
ByeLanka admin
Follow:
Share
6 Min Read
SHARE

Cyber security Mesh: Clusters of network monitoring redefining security By Aditya Abeysinghe

 

Conventional network security monitoring involves establishing a security perimeter around all devices of a network. This method has been followed since the kindergarten days of computer networks and is the de facto standard used to monitor and secure most internal networks at present too. While this may sound easy for monitoring and securing devices in a network, the main disadvantage is that if the perimeter is hacked in some way, then the entire network could be vulnerable to attacks. Furthermore, security policies are often imposed at the edge of the network rather than at identity or other access management levels. Cyber security mesh is a concept that addresses these issues by enforcing security at each access point or similar level, thereby clustering these networks into a mesh of networks that are monitored separately.

 

Covid-19 and network security

More Read

Practical AI for Small Businesses
Practical AI for Small Businesses: 12 Workflows That Save Hours Every Week – By Bhanuka – eLanka
The Power of Pomegranates: Nature’s Ruby of Health and Vitality – By Malsha – eLanka
SUNDAY CHOICE – His Name is Jesus – By Charles Schokman

Cyber security mesh is not a new concept. It has been used in more complex networks that are highly guarded and regularly monitored. However, Covid-19 caused a major change in the manner people use networks. For example, today most people work on a “work-from-home” method and students study utilizing online classrooms and meetings are conducted online. When working from home, people often login to organizational networks from outside the usual internal network and data is shared between multiple networks. In this manner of working, and studying, this type of changes (deviating from physical face to face to face interactions) have caused many issues in managing the security of networks from hackers who have developed new ways of attacking these systems.

Cyber security mesh has been thus increasingly used in many networks, since the Covid-19 pandemic began as a measure of redefining network policies and permissions to networks. With this architecture, the authorized person is provided access to only the segment that he/she is required to access.

Cyber security Mesh Clusters of network monitoring redefining security

Identity and Access Management

Identity and access management (IAM) is simply the process of authentication and authorization users based on policies and permissions. The traditional security of a system involves the username and password based approach where the user is authenticated at a logon service such as a database or directory, and then redirected based on the role the user has on a system.

With IAM a user is often grouped into a user category. Instead of providing access level rules on which components are accessible to a user, the access is granted to the user category, so that all users inherit these policies. In this manner, managing identities (people) and access is productive and security efficient. Typically, security in an IAM based system is enhanced with MFA* and SSO*.

Why is a Cyber security mesh important?

With new methods of accessing networks remotely, new methods of securing systems as described earlier is required. One of the main issues in IAM in securing systems is the difficulty in identity proofing users. Identity proofing or identity verification is the process of proving that a user is the user that needs to be authenticated. As a hacker can bypass MFA and SSO or other capabilities in IAM, impersonation of users to get authorized to systems is easy given that many processes are operated remotely at present. By using a mesh where the network is divided into segments and then using IAM and other access control mechanisms, even impersonated users have minimal capability of attacking the entire system instead, attacks could be identified in the first defense layer and thereafter, mitigated.

Cyber security mesh is also important to defend networks which span on heterogeneous systems. In these systems, the method of securing data and devices are different, based on factors such as internal policies, technologies used and the architecture of the system. Hence, the security of such type of systems is complex to be maintained when these systems are joined together. Instead, by using a mesh of smaller manageable components, the system could be monitored and managed efficiently.

  • MFA: Multi-Factor Authentication is a method of using more than one method of authentication to a system. For example, a user may be authenticated with a username and password and a one-time password may be required to access critical components of an authorized system.
  • SSO: Single Sign On is a method of authenticating a user once and then providing access to multiple systems without authenticating at each system.

Photo courtesy: https://www.technorad.com 

 

TAGGED:Aditya AbeysingheCyber securityMFASSO
Share This Article
Email Copy Link Print
Previous Article Perth Scorchers snare Chamari for WBBL
Next Article jksb JKSB : STOCK MARKET WEEKLY 18-06-2021
FacebookLike
YoutubeSubscribe
LinkedInFollow
Most Read
10 Pictures With Fascinating Stories Behind Them!

“A PICTURE SPEAKS A 1000 WORDS” – By Des Kelly

Look past your thoughts so you may drink the pure nectar of this moment

A Life Hack for when we’re Burnt Out & Broken Down – By Uma Panch

Narration of the History of our Proud Ancestral (Orang Jawa) Heritage. by Noor R. Rahim

eLanka Weddings

eLanka Marriage Proposals

Noel News

Noel News

Noel News

Noel News- By Noel Whittaker

EILEEN MARY SIBELLE DE SILVA (nee DISSANAYAKE) – 29 September 1922 – 6 April 2018 – A Woman of Value an Appreciation written by Mohini Gunasekera

K.K.S. Cement Factory

Dr.Harold Gunatillake’s 90th Birthday party

Sri Lanka's women's cricket squad in Melbourne

Cricket: Sri Lanka’s women’s squad in Melbourne

- Advertisement -
Ad image
Related News
Articles

showcasing Christine Goonawardana – by eLanka

Trump and Putin
Articles Dr Harold Gunatillake

High-Stakes Diplomacy: Trump, Putin and the Quest for Peace in Hungary -By Harold Gunatillake

Articles

Media release – Celebrate connection and culture at Hornsby’s ‘Friends, Food and Fun’ community event

Sri Lanka vs South Africa Women’s Cricket 2025
Articles Sunil Thenabadu

SRI LANKA TROUNCED BY SOUTH AFRICA BY 10 WICKETS IN RAIN SHORTENED GAME AT RPS – By Sunil Thenabadu

Vision Care Marks World Sight Day 2025 with Awareness Walk Promoting Eye Health 01
Articles

Vision Care Marks World Sight Day 2025 with Awareness Walk Promoting Eye Health

  • Quick Links:
  • Articles
  • DESMOND KELLY
  • Dr Harold Gunatillake
  • English Videos
  • Sri Lanka
  • Sinhala Videos
  • eLanka Newsletters
  • Obituaries
  • Tamil Videos
  • Dr. Harold Gunatillake
  • Sunil Thenabadu
  • Sinhala Movies
  • Trevine Rodrigo
  • Michael Roberts
  • Tamil Movies

eLanka

Your Trusted Source for News & Community Stories: Stay connected with reliable updates, inspiring features, and breaking news. From politics and technology to culture, lifestyle, and events, eLanka brings you stories that matter — keeping you informed, engaged, and connected 24/7.
Kerrie road, Oatlands , NSW 2117 , Australia.
Email : info@eLanka.com.au / rasangivjes@gmail.com.
WhatsApp : +61402905275 / +94775882546

(c) 2005 – 2025 eLanka Pty Ltd. All Rights Reserved.