Thursday, October 31, 2019
Network Security Term Paper Example | Topics and Well Written Essays - 1500 words
Network Security - Term Paper Example (213) INTRODUCTION: It consists of various policies to prevent the misuse of the data or unauthorised access of the data by users who does not own it. Certain provisions and policies are made in this regard by the administrator, to ensure confidentiality of data .This system is so designed that authorization of access to data in a network is controlled by the network administrator only without interference of any other person. For this purpose, all users are given a separate ID i.e. the identity of the individual and a password by the administrator so that access to information and programs are allowed by that user only within their authority. It is a complex job and can be tackled by efficient, experienced and well-trained experts. Network security system is a combination of many computer networks which can be either public or private. It includes everyday jobs like conducting transactions and communications among businesses, government agencies and individuals. Networks can also be private, such as a network dealing a specific company, and others which might be open to public access. In organizations, enterprises, and other types of institutions Network security is involved so as to maintain the confidentiality of their data (King, 10). Role of Network Security: How does it protects you It performs the key role as the name indicates as quoted by (Bragg et al) : Unauthorized access: It secures the network, and does not allow any unauthorized access. Confidentiality : It also plays a chief role in protecting and overseeing operations being done and preventing their unknown user access. A Unique Name : Protection of a network resource requires the corresponding password and unique name as mentioned above in an earlier section. Executing Commands Illicitly: It is undesirable for an unknown and non-trusted individual to execute and run the commands server machines. Security system doesnââ¬â¢t allow any such activities. Protects the system from Viruses, worms an d Trojan horses: Many antiviruses are developed so that a secure system may be provided. Concept: The key feature of network security is allocating the user, commonly with an authentic username and a password. One-factor authentication: The password is something which known by the user only. This can he termed as one-factor authentication. Two- factor authentication: This something the user already has can also be used as his identity. For an example, A security token An ATM card Mobile phone number Any of the above belongings can be used as an individualââ¬â¢s identity in a secured network. Three-factor authentication: Every individual can be identified by something the user is. For an example, A fingerprint Retinal scan Firewall: It enforces access policies blocking the unauthorized network access. For instance, which services may be allowed to be accessed by the user in certain network? This feature is plays a very helpful and efficient role in preventing the unauthorized acce ss to the data. The only drawback of this component is that it way fails to detect any potentially harmful error like ââ¬ËComputer wormsââ¬â¢ are being transmitted over the network (Radack, 215). Proxy According to Okechukwu et al.,( 480) Process of having one host act in behalf of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.