Network security involves protecting a company's data and resources across its network from potential threats. It works through physical, technical, and administrative security controls. The goals of network security are confidentiality, integrity, and availability of data and resources. There are two types of attacks - passive attacks which monitor information without affecting the system, and active attacks which alter systems or data.
Network security involves protecting a company's data and resources across its network from potential threats. It works through physical, technical, and administrative security controls. The goals of network security are confidentiality, integrity, and availability of data and resources. There are two types of attacks - passive attacks which monitor information without affecting the system, and active attacks which alter systems or data.
Network security involves protecting a company's data and resources across its network from potential threats. It works through physical, technical, and administrative security controls. The goals of network security are confidentiality, integrity, and availability of data and resources. There are two types of attacks - passive attacks which monitor information without affecting the system, and active attacks which alter systems or data.
Network security involves protecting a company's data and resources across its network from potential threats. It works through physical, technical, and administrative security controls. The goals of network security are confidentiality, integrity, and availability of data and resources. There are two types of attacks - passive attacks which monitor information without affecting the system, and active attacks which alter systems or data.
• How does Network Security work? • Goals of Network Security • Types of Attack in Network Security What is Network Security?
• Network security is defined as the process of creating a defensive approach
that secures a company’s data and its resources across its network. It protects the organization against any form of a potential threat or unauthorized access. How Does Network Security Works?
• When planning the network security of an organization, you need to
acknowledge that an attack can occur in any area. Therefore, you need to consider three levels of security controls and those include: Physical Network Security Technical Network Security Administrative Network Security Physical Network Security
• Physical network security is used to prevent unauthorized individuals from
gaining physical access to components such as routers or cabling cupboards. This is done with the help of locks, biometric authentication, and a range of other devices. Technical Network Security
• Technical security involves the protection of data stored in the
network or data getting in and out of the network. Data protection should focus on unauthorized access and also malicious use by employees. Administrative Network Security
• Administrative security controls consist of security policies and
processes that control user behavior, including how users are authenticated, their level of access that control network accessibility level by different users. Goals of Network Security
• The primary goal of network security are Confidentiality,
Integrity, and Availability. These three pillars of Network Security are often represented as CIA triangle. Confidentiality: The function of confidentiality is to protect precious business data from unauthorized persons. Confidentiality part of network security makes sure that the data is available only to the intended and authorized persons. Integrity: This goal means maintaining and assuring the accuracy and consistency of data. The function of integrity is to make sure that the data is reliable and is not changed by unauthorized persons. Availability : The function of availability in Network Security is to make sure that the data, network resources are continuously available to the legitimate users, whenever they require it. Types of Attack
There are two types of attack:
Passive Attack Active Attack Passive Attack: A passive attack attempt to monitoring or make use of information from the system .The goal of opponent is to obtain information is being transmitted but does not effect system. Active Attack:
These attacks attempts to alter system resources or affect their
operations. This attack involve some modification of the data stream or creation of false statement.