wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Network Security?

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name—i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).Communication between two hosts using a network may be encrypted to maintain security and privacy.


Comments ()


Sign in

Read Next

Memory management

Blog banner

Modern Operating System - Suren Kotian

Blog banner

Article on different management system

Blog banner

BUFFER OVERFLOW_142

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

How Laughing Gas Makes Your Dental Visit So Much Easier

Blog banner

Blog on Smartsheet.

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

Uniprocessor Scheduling

Blog banner

A Brief Review on Cyber Forensics and its Analysis Tool

Blog banner

10 Unknown facts about India's Independence

Blog banner

Operating system evolution

Blog banner

Steganography and Steganalysis

Blog banner

Data Structures

Blog banner

PROCESS CONTROL BLOCK IN OS

Blog banner

Video games

Blog banner

Tiranga - Abbas Haveliwala

Blog banner

Types of E-Commerce

Blog banner

Data Mining

Blog banner

Virtual machine

Blog banner

The Art Of Getting What You Want In Life....

Blog banner

PERT Overview

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

Best password managers: Reviews of the top products

Blog banner

The most common internet security threats

Blog banner

How User Data Shapes Personalised Campaigns

Blog banner

Deadlock and Starvation

Blog banner

100 Awesome Keyboard Shortcuts that you didn't knew

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Deadlock and Starvation

Blog banner

child Labour

Blog banner

What is service level Agreement?

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Some facts about Technology

Blog banner

Developments in Modern Operating Systems

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Deadlock

Blog banner

Simple STEM Activities for Toddlers That Spark Curiosity

Blog banner

Short note on expert system

Blog banner

A Heartfelt Act of Kindness

Blog banner

A True Friendship

Blog banner