Computer Science

Network Security

Network security involves the protection of networks and their data from unauthorized access, misuse, or disruption. It encompasses various measures such as firewalls, encryption, intrusion detection systems, and virtual private networks to safeguard the integrity, confidentiality, and availability of network resources. This field is crucial in ensuring the secure and reliable operation of computer networks.

Written by Perlego with AI-assistance

3 Key excerpts on "Network Security"

Index pages curate the most relevant extracts from our library of academic textbooks. They’ve been created using an in-house natural language model (NLM), each adding context and meaning to key research topics.
  • Cybercrime and Information Technology
    eBook - ePub

    Cybercrime and Information Technology

    Theory and Practice: The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices

    • Alex Alexandrou(Author)
    • 2021(Publication Date)
    • CRC Press
      (Publisher)

    ...For additional information on the OSI model and the application layer, see Chapter 5. Cybersecurity refers to protection from criminal activity facilitated by the Internet. It also relates to the protection of Internet-connected devices, computer programs, networks, and data from cybercriminals. In other words, cybersecurity protects physical security, which consists of sites, equipment, infrastructure, etc., and logical security, which consists of software safeguards such as user passwords, access, and authentication of Information and Communications Technology (ICT). Additionally, cybersecurity includes neglected and non-intentional incidents that compromise the confidentiality, integrity, and availability of computing systems and data. Network Security involves the use of countermeasures to protect the networking infrastructure, both software and hardware, from intruders. Information security, or InfoSec, refers to safeguarding data in storage, in transit, and while being used. According to 44 U.S.C. 3542—Definitions 13 13 United States Code, 2006 Edition, Supplement 5, Title 44—Public Printing and Documents. 44 U.S.C. 3542—Definitions. Retrieved from https://www.govinfo.gov/app/details/USCODE-2011-title44/USCODE-2011-title44-chap35-subchapIII-sec3542 (1) The term “information security” means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to provide— (A) Integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity. Integrity safeguards that data and systems are authentic, neither modified nor corrupted. (B) Confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information...

  • Telecommunications
    eBook - ePub

    Telecommunications

    A Handbook for Educators

    • Resa Azarmsa(Author)
    • 2013(Publication Date)
    • Routledge
      (Publisher)

    ...Chapter Eleven Data Communication Security Introduction The ever-decreasing cost of hardware and software and an increasing quality and awareness of computer applications have generated a very high demand for computer acquisition and implementation among organizations in both public and private sectors. Many of these computers have been used or will be used in a network environment. It is estimated that over 90 percent of the minicomputers and mainframes sold or leased in the United States have communications capabilities. This could be the beginning of an increase in problems related to computer security. Computer security is no longer a technical problem. It is managerial as well as technical and this will have a dramatic impact on the success or failure of any computer utilization. The National Center for Computer Crime Data (NCCCD), based in Los Angeles, reports that computer-related crimes were most often committed by programmers, students, and data entry operators. Exactly how the computer misdeeds are distributed is unknown. Studies by NCCCD, however, estimate that 44 percent of the computer crimes are money theft, 16 percent damage to software, 10 percent theft of information or programs, 12 percent alteration of data, and 10 percent theft of service. Why Is Computer Security Needed? In an educational organization, information may range from employees’ data to inventory data or even to sensitive student reports. This very expensive resource can be the target of unauthorized use such as divulging student records, changing grades, and possible destruction of a school’s data file which would be disastrous for the organization. When organizations decide to use computers, there are two options available. Option one prescribes a stand-alone system which is solely owned and used by a particular organization. If this is the case the security issues are more controllable. Option two is the network utilization...

  • Cybersecurity Fundamentals
    eBook - ePub

    Cybersecurity Fundamentals

    A Real-World Perspective

    • Kutub Thakur, Al-Sakib Khan Pathan(Authors)
    • 2020(Publication Date)
    • CRC Press
      (Publisher)

    ...6 Securing Your Computers 6.1 Introduction Computers have become an integral part of our daily life. We use computers so extensively that our personal and public matters and activities are fully under the influence of computers. We communicate through computers, we buy through computers, we sell through computers, we travel with the help of computer-based systems, we work through computers, we are paid through computers, and even we order our foods through computers. The computers have drastically changed the way we lived our lives a few decades back. In the 1970s, when the first microprocessor was developed, nobody thought of that chip to influence the way it has done in today’s modern life. After the development of Internet and World Wide Web, the influence of computers has become eminent on all fields and activities of life. As the dependency of the people on computers increased, the issues with security of the computer expanded exponentially. No one was aware of the dark side of the impact of computer till the first malicious program hit the Internet resulting in huge losses to the public lives and businesses. The demand for the security of computers started to increase exponentially in the modern field of information technology. There are many kinds of threats to the computers, communication networks, and all physical infrastructures that use the power of computer for their operations. The threats to the computers can be divided into two major parts: Traditional physical security threats Cybersecurity threats The physical threat can be further classified into the following: Overt physical threats Covert physical threat Similarly, the cybersecurity threat can be classified into the following: Computer security Network Security Data security In this chapter, we are going to talk about how to secure your computer from the cyber threats. From the beginning of cybersecurity threats, the number of hackers is increasing very fast...