wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Network Security?

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name—i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).Communication between two hosts using a network may be encrypted to maintain security and privacy.


Comments ()


Sign in

Read Next

Virtual Machine

Blog banner

Mumbai Metro 3

Blog banner

Unlocking Success: Mastering Google Ads Strategies

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Data Mapping

Blog banner

note taker app

Blog banner

OPERATING SYSTEM

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

SPAM

Blog banner

Memory Management

Blog banner

Explain website hacking issues

Blog banner

Deadlocks in Operating Systems

Blog banner

How to write a cover letter

Blog banner

Direct memory access

Blog banner

"Geographic Information Systems (GIS) and its Applications in Urban Planning"

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

Multiprocessor and scheduling

Blog banner

Critical success factors

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

What is metaverse?

Blog banner

INTERRUPTS

Blog banner

Session Vulnerabilities

Blog banner

MACHINE LEARNING

Blog banner

Not anti-social, but pro-solitude

Blog banner

Life of a 2020-2021 student

Blog banner

Service Transition Process in ITSM

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Smitten Kitchen Keepers

Blog banner

IoT Evolution

Blog banner

Deadlock

Blog banner

CSI and Organizational Change

Blog banner

Big Data Architecture

Blog banner

Hello World

Blog banner

Working with Sniffers for monitoring network communication

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

A BLOG ON MYSQL

Blog banner

APACHE KAFKA

Blog banner

Disk Management

Blog banner

Oracle Corporation

Blog banner

A Short History of GIS

Blog banner

Method of Evaluating Information Security Level in an Organization

Blog banner

Beyond the Track: Why the Best Hotel in Arcadia, Florida, Completes Your IMSA Sebring Getaway

Blog banner