network security notes
#1
Sad 

pls i need vidyalnkar notes for refernce
Reply
#2

Network security consists of policies and practices adopted to prevent and monitor unauthorized access, misuse, modification or denial of a computer network and accessible network resources. Network security involves authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authentication information that allows them to access information and programs within their authority. Network security encompasses a variety of computer networks, both public and private, used in day-to-day work; conducting transactions and communications between businesses, government agencies and individuals. Networks can be private, such as within a company, and others that may be open to public access. Network security is involved in organizations, companies and other types of institutions. He does as his title explains: Secures the network, as well as the protection and supervision of the operations being carried out. The most common and easy way to protect a network resource is to give it a unique name and a corresponding password.

Network security starts with authentication, commonly with a username and password. Since this requires only one detail that authenticates the user name, that is, the password, it is sometimes called a one-factor authentication. With two-factor authentication, something is also used by the user (for example, a security token or dongle, an ATM card or a mobile phone); and with the authentication of three factors, something that the user 'is' is also used (for example, a fingerprint or retinal scan).

Once authenticated, a firewall enforces access policies, such as services that network users can access. Although effective in preventing unauthorized access, this component may fail to check for potentially harmful content such as computer worms or Trojans that are transmitted over the network. Antivirus software or an intrusion prevention system (IPS) helps detect and inhibit the action of such malware. An anomaly-based intrusion detection system can also monitor the network as wire-shark traffic and can be registered for audit purposes and for further high-level analysis. Newer systems that combine unattended auto-learning with complete analysis of network traffic can detect active network attackers from malicious initiates or external attackers who have compromised a machine or user account.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Beautician course notes in hindi 0 5,811 24-02-2020, 04:31 AM
Last Post:
  Earthquake detection alert alarm for people security ppt 0 871 06-01-2019, 09:29 AM
Last Post:
  Earthquake detection alert alarm for people security 0 792 06-01-2019, 09:25 AM
Last Post:
Wink wireless network pagalavan book free pdf 0 635 27-09-2018, 07:06 PM
Last Post: Guest
  computer graphics notes hindi pdf free download 1 1,369 21-08-2018, 05:07 PM
Last Post: Dharmesh Sankhla
  arunkumar network security vtu ece notes pdf 0 914 19-08-2018, 12:01 AM
Last Post: Guest
  vtu 7th sem cse ashok kumar notes pdf embedded computing system 0 1,286 16-08-2018, 07:25 PM
Last Post: Guest
  medha spoken english full notes pdf 0 956 09-08-2018, 12:45 PM
Last Post: Guest
  rnsit java notes download 0 763 08-08-2018, 10:23 PM
Last Post: Guest
  vidyalankar msc it notes download 0 505 07-08-2018, 07:01 PM
Last Post: Guest

Forum Jump: