wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Benefits and drawback of web security.

profile
Abhinash Jha
Aug 26, 2022
0 Likes
0 Discussions
52 Reads

Introduction: Web security refers to protecting network and computer system from damage to or the theft of software, hardwork,or data. It includes protecting computer system from misdirecting or disrupting the service they designed to provide .

The three main categories of security are management security , operational security, physical security control.

Some benefits of web security are:

 

*Protection of  intellectual property 

*Prevention of cyber espionage

*Improve customer confidence

*Preventing financial fraud and embezzlement.

 

Disadvantages of web security are:

*Firewalls are tricky to be set up properly.

*Firewalls that are incorrectly instructed may block user from engaging in certain internet activity till the firewall is configured correctly.

*Slow down the system even more than before.

 

 

 

 

 


Comments ()


Sign in

Read Next

10 Survival Tips that might save your life

Blog banner

Lifestyle of a photographer

Blog banner

Virtual memory in os

Blog banner

Virtual Memory

Blog banner

Online Education

Blog banner

Ransomware

Blog banner

Memory Management Techniques

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

Process Creation

Blog banner

Artical on FreshBooks

Blog banner

PERT Overview

Blog banner

RAID

Blog banner

File System

Blog banner

Deadlock

Blog banner

Hypothesis Testing in Data Science

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

virtual machine

Blog banner

Sage

Blog banner

Google classroom

Blog banner

The Importance of Data Quality Management in Data Science

Blog banner

OS Evolution Achievements

Blog banner

RAID

Blog banner

Can a Water Flosser Replace Manual Flossing? Here’s What Dentists Say

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Zomato (Income Sources)

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

memory management

Blog banner

Regression Analysis

Blog banner

Risk factors in service transistion

Blog banner

An Overview of Virtual Machines

Blog banner

GIS Topography

Blog banner

What is Influencer Marketing and its Trends

Blog banner

Understanding Endometriosis and Its Psychological Impact on Quality of Life

Blog banner

Cache Memory

Blog banner

USES OF WHATSAPP

Blog banner

Texting is actually better than talking in person

Blog banner

Multicore CPUs

Blog banner

How Sleep Impacts Learning and Behaviour for Toddlers?

Blog banner

Buffer Overflow

Blog banner

Everything You Need for a Perfect Stay in Arcadia, Florida, USA.

Blog banner

Blockchain technology: security risk and prevention

Blog banner

Dekkers Algorithm : Ensuring Safe Process Synchronization

Blog banner