NETWORK SECURITY AND AUTHENTICATION

The previous two articles discussed about the fundamentals of information as well as network security issues which lead to different kinds of problem: attacks, theft of essential information and software vulnerabilities. Here we shall learn about how to build a secure network. We shall also learn about the various parameters which must be considered for network security. There can be various security issues involved in small and medium sized businesses which require utmost attention for creating the secure network. Then we shall be covering different kind of tools available for network security, critical elements of network security like Firewall, password mechanisms, encryption, authentication & integrity etc. Lastly, we shall study about some secure network devices like secure modems. Let’s first read the basics of network and network security.

As we know the basics of network and its security. Computer network is defined as system of interconnected computers linked by communication systems and it can be both public and private where network security encompasses all the activities that organizations, enterprises and institutions undertake to protect the value and ongoing usability of assets and integrity and continuity of operations. In brief, we can say the network security deals in identifying all the risks and vulnerabilities to network and to select the best tools and practices to combat them.

An organizational network may be susceptible to various kinds of threats like virus, Trojan horse, unauthorized access, executing commands illicitly, vandals / destructive behavior (which includes data destruction and data diddling), social engineering, Denial of Service attacks etc.

To combat with above mentioned threats there are various kind of tools are available in the market. These tools can protect the computer network at many levels. These network tools are classified into different categories like antivirus software packages, secure network infrastructure tools, dedicated network security hardware a software tools, Virtual private network tools & identity services etc.

Comments

Popular posts from this blog

COMPUTER VISION

FUNDAMENTALS OF EMBEDDED SYSTEMS

ADVANCED METHODS OF COMMUNICATION WITH A COMPUTER