Wednesday, May 1, 2019
Network Security Term Paper Example | Topics and Well Written Essays - 1500 words
Network Security - Term Paper Example(213) INTRODUCTION It consists of variant policies to prevent the misuse of the data or unauthorised access of the data by drug exploiters who does not aver it. Certain provisions and policies argon made in this regard by the administrator, to ensure confidentiality of data .This dodging is so designed that authorization of access to data in a communicate is controlled by the network administrator only without interference of any other person. For this purpose, all users atomic rate 18 given a disjoint ID i.e. the identity operator of the individual and a password by the administrator so that access to information and programs are allowed by that user only within their authority. It is a complex job and can be tackled by efficient, experienced and well-trained experts. Network security system is a combination of many computer networks which can be either public or private. It includes ein truthday jobs like conducting transactions and co mmunications among businesses, goernment agencies and individuals. Networks can likewise be private, such as a network dealing a specific company, and others which might be open to public access. In organizations, enterprises, and other types of institutions Network security is involved so as to take the confidentiality of their data (King, 10). Role of Network Security How does it protects you It performs the key graphic symbol as the name indicates as quoted by (Bragg et al) Unauthorized access It secures the network, and does not allow any unauthorized access. Confidentiality It also plays a chief role in protecting and overseeing operations being done and preventing their unknown user access. A Unique reboot Protection of a network resource requires the corresponding password and unique name as mentioned preceding(prenominal) in an earlier section. Executing Commands Illicitly It is undesirable for an unknown and non-trusted individual to execute and run the commands ho rde machines. Security system doesnt allow any such activities. Protects the system from Viruses, worms and Trojan horses Many antiviruses are developed so that a secure system may be provided. Concept The key have of network security is allocating the user, commonly with an authentic username and a password. One-factor authentication The password is something which known by the user only. This can he termed as one-factor authentication. Two- factor authentication This something the user already has can also be used as his identity. For an example, A security token An ATM card Mobile phone number Any of the above belongings can be used as an individuals identity in a secured network. Three-factor authentication Every individual can be identified by something the user is. For an example, A fingerprint Retinal scan Firewall It enforces access policies blocking the unauthorized network access. For instance, which services may be allowed to be accessed by the user in certain network? This feature is plays a very helpful and efficient role in preventing the unauthorized access to the data. The only drawback of this component is that it way fails to learn any potentially harmful error like Computer worms are being transmitted over the network (Radack, 215). Proxy According to Okechukwu et al.,( 480) Process of having one host act in behalf of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment