wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Network Security?

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name—i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).Communication between two hosts using a network may be encrypted to maintain security and privacy.


Comments ()


Sign in

Read Next

Deadlock in Operating System

Blog banner

GIS info about Bermuda Triangle

Blog banner

Operation system

Blog banner

Virtualization

Blog banner

Sagar Parikrama

Blog banner

Esri India launches Policy Maps.

Blog banner

Why am I never satisfied with my Life?

Blog banner

Digital Marketing Ethics Transparency Trust And Brand Reputation digital

Blog banner

BharatPe

Blog banner

Malware

Blog banner

How Men and Women Process Pain Differently

Blog banner

Modern operating system

Blog banner

Tomato Butter Sauce with Bucatini

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Review on Recovering Deleted Files

Blog banner

Short note on expert system

Blog banner

The application udemy

Blog banner

Install Ubuntu in Vmware

Blog banner

Product Discount Calculator

Blog banner

Interrupts in OS

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

IoT Evolution

Blog banner

History of ITIL

Blog banner

Importance of education

Blog banner

Memory Hierarchy

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

Smartphone Security: Vulnerabilities and Attacks

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

Amazon

Blog banner

Session Hijacking Techniques

Blog banner

Life lesson

Blog banner

Kernel Memory Allocation In Linux.

Blog banner

Predictive Analysis - Ek Overview

Blog banner

How to Encrypt and Decrypt Using GNU PGP

Blog banner

File system implementation

Blog banner

Marvel Cinematic Universe

Blog banner

GIS in Disaster Management

Blog banner

Buffers in Operating Systems

Blog banner

Child labour

Blog banner

The Power of Teamwork: Learning Collaboration Through Everyday Activities

Blog banner

Memory Management

Blog banner