Explain security, network security and information security, Computer Network Security

Assignment Help:

What do you understand by the terms security, network security and information security? How network security and information security are connected?

Security can be defined as:

Security  is  a  protective  measure  which  results  a  condition  to  ensure  the  state  of  data integrity which is maintained against unauthorized access. In straight terms, security is a measure or mechanism which ensures safety from the intruders. The intent of using security measure is to make sure that the intruders cannot interfere in any of the confidential matters.  Security can be given to both information as well as network.

Network Security is defined below:

Network security s mostly concerned with protection of networks and their services from an unauthorized access, alteration and destruction of the data. In straight terms, network security protects remote services from intruders which are not authorized to use them. An efficient network security strategy includes identification of all the threats, before selection of tools/devices which tackle them.

Information Security is defined below:

The procedure of preventing the sensitive information from the intruders is simply known as information security. It protects information confidentiality, availability and integrity against unauthorized access. The intent of information security is to make sure that the intruders cannot write, read or modify any content of information.

The network security and information security are mainly related to each other that is network  security  provides  security  to  the  information  which  is  being  traversed  across  the network. Therefore, this also performs the functionality of information security in addition to securing network peripherals.


Related Discussions:- Explain security, network security and information security

Access control list, Scenario: A network with individual hosts (really, vir...

Scenario: A network with individual hosts (really, virtual machines) can run HTTP (web) servers that are available to the outside. (Here, available means the ability to read and wr

SNORT, Detect each visit to www.google.com that is made by the machine. o S...

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

Does ssl protect against eavesdropping, QUESTION (a) Consider the follo...

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

Base lining-information security, Base lining •    Organizations do not ...

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

#title.TIPS., 1. For this project, assume that an organization has five ser...

1. For this project, assume that an organization has five servers. Server 1 has a TCO of $25,000, Servers 2 and 3 have a TCO of $37,000 each, and the remaining two servers— Servers

Fragment identification, FRAGMENT IDENTIFICATION: IDENT field in every...

FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

Summarises the firewall protocols, Your rules should ensure that Internet a...

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

Keystroke-based access control model, Suppose you are working for one of th...

Suppose you are working for one of the leading credit reporting agencies that manages users' credit rating info with different financial institutions.  The company wishes to implem

Cyber security, How to pretect my computer from attacking

How to pretect my computer from attacking

Problem of spam mail, Topic -Spam is an ever-growing problem, with some net...

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd