wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Network Security?

profile
Runali Parsekar
Aug 26, 2022
0 Likes
0 Discussions
90 Reads

Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name—i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).Communication between two hosts using a network may be encrypted to maintain security and privacy.


Comments ()


Sign in

Read Next

Street foods

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

All you need to know about “On-page SEO”

Blog banner

Online Games

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

Question

Blog banner

To travel is to live

Blog banner

Water Resources are about to exhaust...

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

10 Types of Friends in every friend group

Blog banner

Music is life

Blog banner

OLA

Blog banner

Objectives and Functions of Operating System

Blog banner

Importance of modern technology era

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

SmartData Collective: Data Science aur Analytics ki Duniya

Blog banner

Emotional Intelligence in Children: Why It Is as Important as Academics

Blog banner

This is my first blog.

Blog banner

Cache Memory in Operating Systems

Blog banner

VIRTUAL MEMORY

Blog banner

Cache memory

Blog banner

Virtual Memory

Blog banner

About myself

Blog banner

E-commerce

Blog banner

OS ASSIGNMENT

Blog banner

Nature’s Brush on Silk: The Secret Behind Patola Colours

Blog banner

The seven-step improvement process

Blog banner

How Schools Can Reduce Exam Stress in Students?

Blog banner

Stop Racism

Blog banner

Fault tolerance

Blog banner

The Bold Digital Marketing Moves That Made Durex India’s Second-Largest Condom Brand

Blog banner

Safeguarding Your Data: The Importance of Wireless Encryption

Blog banner

ROLE OF THE COMPUTER FORENSICS TOOLS AND TECHNIQUES

Blog banner

Deadlock and Starvation

Blog banner

Chicken Dum Biryani

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Cloud Security: Trends and Innovations

Blog banner

Os(Computer security threats)

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Operating system evolution

Blog banner

Puri Jagannath temple

Blog banner

Photorec - media recovery tool

Blog banner