wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Network Security?

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name—i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).Communication between two hosts using a network may be encrypted to maintain security and privacy.


Comments ()


Sign in

Read Next

Goa Trip With Friends

Blog banner

Continual service improvement vs maintenance phase in IT

Blog banner

Busted : Common Web Security Myths

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

Memory Management in an Operating System

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

The Evolution of Operating Systems

Blog banner

Starvation

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Types of E-Commerce

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

How to use GIT & GITHUB

Blog banner

Malicious softwares

Blog banner

Smartsheet

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

IT RISK

Blog banner

How Unstructured Play Helps Children Become Creative Thinkers

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Student Grade Calculator in LISP

Blog banner

IP Address

Blog banner

IT GOVERNANCE

Blog banner

Precision-Recall in Data Science

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

Disk scheduling

Blog banner

Khau Galli – Vile Parle

Blog banner

Why we should do reading

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Data carving - using hex editor

Blog banner

Child labour

Blog banner

A Journey By Train

Blog banner

URL vs Domain

Blog banner

Importance of Education

Blog banner

Affiliate Marketing V/S Influencer Marketing

Blog banner

SWEET SHREDDED MANGO CHUNDA (MANGO CHUNDA)

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Fitness

Blog banner

Short-Form Video Marketing: Why It's Dominating the Internet

Blog banner

Senseless Teeths

Blog banner

What is M-commerce and how it's work

Blog banner

When Is the Right Time to Enrol My Toddler Into Preschool? NEP

Blog banner

The Real Reason Patola Outfits Come at a Premium Cost

Blog banner

File management in os

Blog banner