NETWORK SECURITY FUNDAMENTALS: CONCEPTS, TECHNOLOGIES, AND BEST PRACTICES
Author | : Amit Vyas |
Publisher | : Xoffencerpublication |
Total Pages | : 211 |
Release | : 2023-07-17 |
ISBN-10 | : 9788119534067 |
ISBN-13 | : 8119534069 |
Rating | : 4/5 (67 Downloads) |
Download or read book NETWORK SECURITY FUNDAMENTALS: CONCEPTS, TECHNOLOGIES, AND BEST PRACTICES written by Amit Vyas and published by Xoffencerpublication. This book was released on 2023-07-17 with total page 211 pages. Available in PDF, EPUB and Kindle. Book excerpt: The phrase "network security" refers to the measures and processes that are carried out in order to secure computer networks and the resources that are associated with them against unauthorized access, misapplication, modification, or interruption. This may be done by preventing unauthorized users from accessing the network, misusing the network's resources, or interrupting the network's operation. It is of the highest importance to preserve the security of these networks in a world that is getting more and more integrated, where information is routinely traded and transmitted across a variety of different networks. A secure environment that safeguards the availability, integrity, and confidentiality of data and network resources is the primary goal of network security. This purpose requires that a secure environment be provided. This is achieved by ensuring that these assets are not accessible to unauthorized parties. The protection of confidentiality ensures that sensitive information may only be accessed and read by those individuals who have been specifically granted permission to do so. The reliability of the data will not be compromised in any way, and it will maintain its integrity even while being sent and stored. This is what is meant by "data integrity." When it comes to a network, having high availability ensures that all of its services and resources may be accessible by authorized users whenever it is necessary for them to do so. The safeguarding of a computer network calls for a combination of hardware, software, and operational controls to be implemented. These protections protect the network against a wide range of attacks, including those listed below: