Tuesday, 18 February 2020

Network Security

0 comments

Network Security


? A network is simply a collection of computers or other hardware devices that are connected
together, either physically or logically, using special hardware and software, to allow
them to exchange information and cooperate.
? Networks that connect computers lying within a small distance (such as a room, or within
a building) from each other are called Local Area Networks (LANs).
? A wide area network connects computers which are very remotely placed. It may connect
across the countries or continents or the entire globe.
? MAN is a network that interconnects users with computer resources in a geographical
area larger than that covered by even a large local area network (LAN) but smaller than
the area covered by a wide area network (WAN).
? Securing network infrastructure is like securing possible entry points of attacks on a
country by deploying appropriate defense.
? Network security consists of the provisions made in an underlying computer network
infrastructure, policies adopted by the network administrator to protect the network and
the network-accessible resources from unauthorized access and consistent and continuous
monitoring and measurement of its effectiveness (lack) combined together.
? Trusted networks are defined as “the networks within your security boundary, and are
typically the networks you are trying to defend.”
? Untrusted network is considered as “the networks external your security perimeter.
? To avoid highly injurious “superworms” or hackers by means of unknown or unpatched
exploits, unusual solutions are required that are intended to avert and react to unknown
attacks, instead of known attacks.


Computer Security: It is more like providing means to protect a single PC against outside
intrusion.
LAN: Networks that connect computers lying within a small distance (such as a room, or within
a building) from each other are called Local Area Networks (LANs).
Preventive Measures: It attempt to secure the access to individual computers – the network itself
– thereby protecting the computers and other shared resources such as printers, network-attached
storage connected by the network.
Securing Network Infrastructure: It is like securing possible entry points of attacks on a country
by deploying appropriate defense.
Trusted Networks: Trusted networks are defined as “the networks within your security boundary,
and are typically the networks you are trying to defend.”
Untrusted network: It is considered as the networks external your security perimeter.

No comments:

Post a Comment