COMPUTER NETWORK SECURITY

Computer Network security is a specialized field in computer networking that involves securing a computer network infrastructure. Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work.

A network security system typically relies on layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and appliances. All components work together to increase the overall security of the computer network.

Many network security threats today are spread over the Internet. The most common include:

  • Viruses, worms, and Trojan horses
  • Spyware and adware
  • Zero-day attacks, also called zero-hour attacks
  • Hacker attacks
  • Denial of service attacks
  • Data interception and theft
  • Identity theft

Issues in Network Security:

  • Authentication: Process of verifying identity of a user
  • Integrity: Data that arrives is the same as that is sent
  • Confidentiality: Sensitive information should not be visible to eavesdropper – use encryption
  • Non – Repudiation: Assurance that any transaction that takes place can subsequently be proved to have taken place
  • Authorization: Assigning access rights to users

How Does Network Security Work?

Network security is accomplished through hardware and software. The software must be constantly updated and managed to protect you from emerging threats.

A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security.

Network security components often include:

  • Anti-virus and anti-spyware
  • Firewall, to block unauthorized access to your network
  • Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks
  • Virtual Private Networks (VPNs), to provide secure remote access
sehpaathi

Disqus Comments Loading...

Recent Posts

Marine Collagen and Biotin: The Dynamic Duo for Healthy Skin, Hair, and Nails

In the quest for glowing skin, luscious hair, and strong nails, the combination of marine…

3 months ago

Dive into Marine Collagen: Your Ultimate Guide to Youthful Skin, Strong Joints, and Radiant Hair

In the world of wellness and beauty, marine collagen has emerged as a potent supplement…

4 months ago

Why Orange Flavor Creatine is the Perfect Addition to Your Workout Routine

Creatine has long been a staple in the world of fitness and bodybuilding. Known for…

4 months ago

Learn All About Collagen and the Best Collagen Supplements

Collagen supplements have gained immense popularity, both online and offline, becoming a staple in many…

4 months ago

5 Best Supplements to Include in Your Fitness Routine

As the New Year approaches, many people resolve to get fit, but as time goes…

4 months ago

Top 10 Perfume Brands for Men in India

Luxury fragrances are appreciated for their natural notes derived from flowers, spices, and other natural…

5 months ago