Explain security, network security and information security, Computer Network Security

Assignment Help:

What do you understand by the terms security, network security and information security? How network security and information security are connected?

Security can be defined as:

Security  is  a  protective  measure  which  results  a  condition  to  ensure  the  state  of  data integrity which is maintained against unauthorized access. In straight terms, security is a measure or mechanism which ensures safety from the intruders. The intent of using security measure is to make sure that the intruders cannot interfere in any of the confidential matters.  Security can be given to both information as well as network.

Network Security is defined below:

Network security s mostly concerned with protection of networks and their services from an unauthorized access, alteration and destruction of the data. In straight terms, network security protects remote services from intruders which are not authorized to use them. An efficient network security strategy includes identification of all the threats, before selection of tools/devices which tackle them.

Information Security is defined below:

The procedure of preventing the sensitive information from the intruders is simply known as information security. It protects information confidentiality, availability and integrity against unauthorized access. The intent of information security is to make sure that the intruders cannot write, read or modify any content of information.

The network security and information security are mainly related to each other that is network  security  provides  security  to  the  information  which  is  being  traversed  across  the network. Therefore, this also performs the functionality of information security in addition to securing network peripherals.


Related Discussions:- Explain security, network security and information security

Miss, You are an IT Security administrator in a banking organization. Your ...

You are an IT Security administrator in a banking organization. Your organization hired an outside IT firm to do a proof of Concept for new equipment which is a computer based syst

What is meant by certificate revocation, QUESTION (a) Which PKI (Public...

QUESTION (a) Which PKI (Public Key Infrastructure) model is typically favored by business organization? (b) Give one possible use of the "extensions" field of an X.509 certi

Deployment and implementing of an ids, DEPLOYMENT AND IMPLEMENTING OF AN ID...

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

Calculate alpha and beta value caesar cipher, Task 1 a. Consider the t...

Task 1 a. Consider the table showing the relative frequencies of letters in English. Arrange the frequencies from largest to smallest, and make a cumulative plot, using Exc

Uc, every time i connect to WIFI the UC goes directly to 100% then i doesn'...

every time i connect to WIFI the UC goes directly to 100% then i doesn''t want to come down. what shall i do ?

Risk determination, Risk Determination For purpose of relative risk asse...

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

Explain web defacement, QUESTION (a) Compare and contrast phishing and ...

QUESTION (a) Compare and contrast phishing and pharming attacks (b) Nowadays, web defacement may not always be visual (i) Explain web defacement (ii) What is the main

Define checksum, The method used to check errors is checksum . In this m...

The method used to check errors is checksum . In this method data is treated as a sequence of integers and their arithmetic sum is calculated and the carry bits are added to the

Security goals, what is relation ship between computer security goals?

what is relation ship between computer security goals?

Biology, Ask question #Minimum 100 words are there non parasitic v...

Ask question #Minimum 100 words are there non parasitic viruses

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd