wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Network Security?

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name—i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).Communication between two hosts using a network may be encrypted to maintain security and privacy.


Comments ()


Sign in

Read Next

Hypothesis Testing in Data Science

Blog banner

What is Password Cracking ? and it's Techniques.

Blog banner

virtual machine

Blog banner

File system

Blog banner

Life of an army person

Blog banner

Starting Android Activity Using Intent

Blog banner

Mental Health

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Does School Infrastructure Really Matter For Learning?

Blog banner

Operating Systems Overview

Blog banner

Biometric Authentication Vulnerabilities

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Exploring Florida Beyond the Obvious Tourist Trails

Blog banner

The functions of operating system

Blog banner

OS Assignment 3 Deadlock

Blog banner

Microsoft Word

Blog banner

10 Signs That Prove YOU are his FIRST priority.

Blog banner

Compromising Mobile Platforms

Blog banner

Blockchain Transactions

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

RAID

Blog banner

Types of E-Commerce

Blog banner

MIDDLE CLASS MELODIES!!

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Cross site scripting Attack

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

Simple Ways of Avoiding Basic Mistakes in Smart Phone Security

Blog banner

What is Spyware? and examples of them.

Blog banner

Cyber Security Control

Blog banner

What is Minting & Mining

Blog banner

Intrusion Detection System

Blog banner

Craziness of dream 11 and how it impacts on our life

Blog banner

HR Automation : Need of the hour

Blog banner

Service Design Principles

Blog banner

What if COVID does not exist!

Blog banner

Policies for Service Transition

Blog banner

Modern operating system

Blog banner

PERT Overview

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

Concurrency:Deadlock and Starvation

Blog banner