Explain security, network security and information security, Computer Network Security

What do you understand by the terms security, network security and information security? How network security and information security are connected?

Security can be defined as:

Security  is  a  protective  measure  which  results  a  condition  to  ensure  the  state  of  data integrity which is maintained against unauthorized access. In straight terms, security is a measure or mechanism which ensures safety from the intruders. The intent of using security measure is to make sure that the intruders cannot interfere in any of the confidential matters.  Security can be given to both information as well as network.

Network Security is defined below:

Network security s mostly concerned with protection of networks and their services from an unauthorized access, alteration and destruction of the data. In straight terms, network security protects remote services from intruders which are not authorized to use them. An efficient network security strategy includes identification of all the threats, before selection of tools/devices which tackle them.

Information Security is defined below:

The procedure of preventing the sensitive information from the intruders is simply known as information security. It protects information confidentiality, availability and integrity against unauthorized access. The intent of information security is to make sure that the intruders cannot write, read or modify any content of information.

The network security and information security are mainly related to each other that is network  security  provides  security  to  the  information  which  is  being  traversed  across  the network. Therefore, this also performs the functionality of information security in addition to securing network peripherals.

Posted Date: 7/20/2012 6:11:55 AM | Location : United States







Related Discussions:- Explain security, network security and information security, Assignment Help, Ask Question on Explain security, network security and information security, Get Answer, Expert's Help, Explain security, network security and information security Discussions

Write discussion on Explain security, network security and information security
Your posts are moderated
Related Questions
Problem: (a) Assume that a new application layer protocol is developed for video conferencing application. Which transport layer protocol, between TCP and UDP, will you u

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,

There is another probing methods i-e Trace Route. To get more detail it is used     As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out a

Question: a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

(a) (i) If m = p·q·r where p, q, and r are prime numbers, what is Φ(m)? (ii) Therefore, Determine Φ(440). (b) Describe the following terms as used in cryptography: (i)

(a) Illustrate what you understand by Nyquist Capacity Theorem? (b) Consider we wish to transmit at a rate of 64 kbps over a 4 kHz noisy but error-free channel. What is the mini

ADVANCED RESEARCH PROJECT AGENCY (ARPA) The efforts of ARPA was to active all its research groups have accept to new era computers. For this purpose ARPA started investing in wa


FRAGMENTATION One method is to limit datagram size to smallest MTU of any server. IP needs fragmentation i.e. datagrams can be divided into pieces to fit in network with small