wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Network Security?

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name—i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).Communication between two hosts using a network may be encrypted to maintain security and privacy.


Comments ()


Sign in

Read Next

IOT Hacking Techniques

Blog banner

Predicting Student Performance with Data Science

Blog banner

The New Classic: Indo Western Patola Outfits for Today’s Woman

Blog banner

What is a geographic information system (GIS)?

Blog banner

Hot Mango Pickle (Methiyu)

Blog banner

How the mobile IP is used in GSM architecture.

Blog banner

Life of an army person

Blog banner

5 Stages of Digital Marketing

Blog banner

Blockchain technology: security risk and prevention

Blog banner

?What Children Learn Between Activities: The Hidden Learning Moments in a Preschool Day

Blog banner

MEMORY MANAGEMENT FILE

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Hubspot

Blog banner

Data Lake

Blog banner

A little bit of salt is all the hash needs!

Blog banner

Facebook Shut Down an AI Program!!! Facebook AI bots became Terminators???

Blog banner

Data Warehouse Bus Matrix

Blog banner

Constrains in service design

Blog banner

KASHMIR TRIPS

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Operating system

Blog banner

OS assignment 3

Blog banner

Outlook.com

Blog banner

Deadlock and Starvation

Blog banner

Information Technology In E- Commerce

Blog banner

MySQL

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

K-means use cases

Blog banner

Importance Of Education.

Blog banner

Lemon and Chilli Pickle (Limbu Mirchi Achar)

Blog banner

Virtual Memory

Blog banner

Power of words

Blog banner

Memory Management

Blog banner

HUBSPOT

Blog banner

Knowledge Management in Continual Service improvement (CSI)

Blog banner

Types Of Interrupt

Blog banner

IP ADDRESS

Blog banner

Virtual Machine's

Blog banner

Deadlock and Starvation

Blog banner

Why Friendship at Work is Important

Blog banner

?What Your Dentist Notices The Moment You Sit In The Chair

Blog banner

SNAPCHAT

Blog banner