wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Network Security?

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name—i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).Communication between two hosts using a network may be encrypted to maintain security and privacy.


Comments ()


Sign in

Read Next

Data Mapping

Blog banner

Network Forensics Tools and Techniques

Blog banner

Recipe of Paneer Butter Masala

Blog banner

Virtual Memory

Blog banner

Pooja Silver

Blog banner

Importance of modern technology era

Blog banner

Ethical Hacking

Blog banner

Why Data Security Is Important

Blog banner

Hey Aryan here

Blog banner

Cycling

Blog banner

"Audit" In Data Science

Blog banner

Getting to Kashmir: Alternative to the Jammu-Srinagar highway

Blog banner

Objectives and functions of Operating System...

Blog banner

Why is ITSM important in IT organization?

Blog banner

Processing Crime and Incident Scenes

Blog banner

How social media affect

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Malware

Blog banner

Fault Tolerance

Blog banner

Fitness

Blog banner

Virtual memory in os

Blog banner

Session Vulnerabilities

Blog banner

Memory Management

Blog banner

Question

Blog banner

SNAPCHAT

Blog banner

Travel: Everything Everywhere!

Blog banner

Student Grade Calculator in LISP

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Lifestyle of a photographer

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

Computer Security

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Photography

Blog banner

Marvel Cinematic Universe

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

MODERN OPERATING SYSTEM

Blog banner

therapist blog

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

MORDERN UNIX SYSTEM

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Steganography

Blog banner