Explain security, network security and information security, Computer Network Security

Assignment Help:

What do you understand by the terms security, network security and information security? How network security and information security are connected?

Security can be defined as:

Security  is  a  protective  measure  which  results  a  condition  to  ensure  the  state  of  data integrity which is maintained against unauthorized access. In straight terms, security is a measure or mechanism which ensures safety from the intruders. The intent of using security measure is to make sure that the intruders cannot interfere in any of the confidential matters.  Security can be given to both information as well as network.

Network Security is defined below:

Network security s mostly concerned with protection of networks and their services from an unauthorized access, alteration and destruction of the data. In straight terms, network security protects remote services from intruders which are not authorized to use them. An efficient network security strategy includes identification of all the threats, before selection of tools/devices which tackle them.

Information Security is defined below:

The procedure of preventing the sensitive information from the intruders is simply known as information security. It protects information confidentiality, availability and integrity against unauthorized access. The intent of information security is to make sure that the intruders cannot write, read or modify any content of information.

The network security and information security are mainly related to each other that is network  security  provides  security  to  the  information  which  is  being  traversed  across  the network. Therefore, this also performs the functionality of information security in addition to securing network peripherals.


Related Discussions:- Explain security, network security and information security

Risk control strategies-, Risk Control Strategies Once the ranked vulner...

Risk Control Strategies Once the ranked vulnerability risk worksheet has created, they should choose one of following 4 strategies to control each risk: •Apply safeguards which

Computer security incident response team, QUESTION 1 Using a real life ...

QUESTION 1 Using a real life scenario or context list and set the scene for at least four advantages that an organized incident response program promotes. QUESTION 2 Yo

Nyquist capacity theorem, (a) Illustrate what you understand by Nyquist Cap...

(a) Illustrate what you understand by Nyquist Capacity Theorem? (b) Consider we wish to transmit at a rate of 64 kbps over a 4 kHz noisy but error-free channel. What is the mini

Assignment, Hello i have submitted an assignment and i am still waiting to ...

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

Computer adaptive test, Project Name : Computer Adaptive Test Role ...

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Steganography-cryptography, Steganography It is a process of hiding info...

Steganography It is a process of hiding information in use for a long time. Most popular modern version of this process hides information within files appearing to contain digit

Describe how a cellular network works, Problem 1 . Show various features of...

Problem 1 . Show various features of a 1G network Total three features for each feature of 1G Problem 2. Describe how a cellular network works with functional block diagram

Calculate the minimum required signal strength, Question 1: (a) (i) Ra...

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

Explain what is a broadcast storm, QUESTION: (a) Ethernet has grown in ...

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

Plain-text using play-fair encryption, What is one-time pad for encryp...

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd