Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Network Security

Definition:
Network security is a set of technologies that protects the
usability and integrity of a company's infrastructure by
preventing the entry or proliferation within a network of a wide
variety of potential threats.
Types of Network Security:
The few types of network securities are discussed below:
 Access Control
 Antivirus and Anti-Malware Software
 Cloud Security
 Email Security
 Firewalls
 Application Security
 Intrusion Prevention System(IPS)
Benefits of Network Security:

Network Security has several benefits, some of which are


mentioned below:
1. Network Security helps in protecting clients’ information and
data which ensures reliable access and helps in protecting the
data from cyber threats.
2. Network Security protects the organization from heavy losses
that may have occurred from data loss or any security
incident.
3. It overall protects the reputation of the organization as it
protects the data and confidential items.

Architecture and Standards:


 The standards help create mechanisms by which the policies are
enacted in order to avoid risks, identify threats, and take action in
the event of an incident.
 These policies and standards apply to different areas of the
security program that stretch out across the entire organization.
Wireless Security:
Wireless security is the prevention of unauthorized access or
damage to computers or data using wireless networks, which
include Wi-Fi networks. The term may also refer to the protection of
the wireless network itself from adversaries seeking to damage the
confidentiality, integrity, or availability of the network.

Types of Wireless Security:


Wireless security encryption is mainly divided into four main types:
 Wired Equivalent Privacy Protocol (WEP)
 Wi-Fi Protected Access Protocol (WPA) 
 Wi-Fi Protected Access 2 Protocol (WPA2) 
 Wi-Fi Protected Access 3 Protocol (WPA3)

1. WEP Protocol : Wired Equivalent Privacy Protocol abbreviated as


WEP, was initially originated in the 1999 and is considered the standard
for wireless security encryption. It is less found in today’s modern world
because of the risk of security it is associated with directly/ indirectly.
WEP is not considered stable and Wi-Fi discontinued its use in 2004
because it is easy to exploit this level of security.
Example: Security added in the LAN connections to protect from
unauthenticated users trying to breach privacy.
2. WPA Protocol: WEP was succeeded by Wi-Fi Protected Access
Protocol abbreviated as WAP which offers more security and safety.
WPA has a 128-bit dynamic key called Temporary Key Integrity Protocol
(TKIP) that’s hard to break and makes it unique. One noticeable
disadvantage of WPA was that since it was made for WEP-enabled
devices, so the core components were majorly the same for WPA and
WEP.
3. WPA 2 Protocol : Wi-Fi Protected Access 2 Protocol abbreviated as
WPA2 came next and was better than the previous encryption types.
Here, Temporary Key Integrity Protocol (TKIP) was replaced by Counter
Mode Cipher Block Chaining Message (CCMP).  It is one of the most
used security encryption types.  In 2006, WPA2 was declared to be
used in all wi-fi devices for wireless security encryption. WPA2 offers
Advanced Encryption Standards (AES).  However, the major
disadvantage of WPA2 is that if the security key reached the hands of
the hacker then the entire network is vulnerable to attack.
4. WPA3 Protocol: WPA3 or Wi-Fi Protected Access 3 (WPA3)
Protocol is the newest security encryption that’s gaining popularity.
WPA3 offers high protection and prevents unauthorized access.
Unauthenticated and unauthorized individuals can’t breach this level of
security. WPA3 is the most desired for public networks as it performs
automatic encryption.  

You might also like