wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Network Security?

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name—i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).Communication between two hosts using a network may be encrypted to maintain security and privacy.


Comments ()


Sign in

Read Next

Apple

Blog banner

Why Kanye West (Now Ye) is the GOAT: A Legacy Beyond Music

Blog banner

Uniprocessor Scheduling

Blog banner

Explain DBMS in Brief

Blog banner

OS- Assignnment 1

Blog banner

The Role of Teachers in Building a Child’s Confidence

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

Real time scheduling

Blog banner

Article on Fresh Book

Blog banner

All you need to know about Cassandra

Blog banner

Friendship

Blog banner

Different Types of Data

Blog banner

Difference Between Classification And Clustering

Blog banner

Predictive Analysis - Ek Overview

Blog banner

SAVE TREES

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Child labour

Blog banner

Measuring IT Risk

Blog banner

File management In Operating System

Blog banner

Memory hierarchy

Blog banner

Types of Viruses

Blog banner

The Five Steps of Data Science

Blog banner

Cloud Technology and its Implications for Entrepreneurship

Blog banner

Memory Management

Blog banner

Hey Aryan here

Blog banner

Security Issues

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

INTRANET

Blog banner

ART AND CULTURE OF VRINDAVAN

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Business-to-Business

Blog banner

Understanding Regression Analysis

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

What Makes Patola the Queen of Silk?

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

GIS Applications: How Different Industries are Leveraging Geospatial Data

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

What is OS Fingerprinting?

Blog banner

GIS in Disaster Management

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Cyber Forensics on IOT Devices

Blog banner

Sweet Mango Murabba

Blog banner