Explain security, network security and information security, Computer Network Security

Assignment Help:

What do you understand by the terms security, network security and information security? How network security and information security are connected?

Security can be defined as:

Security  is  a  protective  measure  which  results  a  condition  to  ensure  the  state  of  data integrity which is maintained against unauthorized access. In straight terms, security is a measure or mechanism which ensures safety from the intruders. The intent of using security measure is to make sure that the intruders cannot interfere in any of the confidential matters.  Security can be given to both information as well as network.

Network Security is defined below:

Network security s mostly concerned with protection of networks and their services from an unauthorized access, alteration and destruction of the data. In straight terms, network security protects remote services from intruders which are not authorized to use them. An efficient network security strategy includes identification of all the threats, before selection of tools/devices which tackle them.

Information Security is defined below:

The procedure of preventing the sensitive information from the intruders is simply known as information security. It protects information confidentiality, availability and integrity against unauthorized access. The intent of information security is to make sure that the intruders cannot write, read or modify any content of information.

The network security and information security are mainly related to each other that is network  security  provides  security  to  the  information  which  is  being  traversed  across  the network. Therefore, this also performs the functionality of information security in addition to securing network peripherals.


Related Discussions:- Explain security, network security and information security

TCP / IP, Let me know the details of protocol tcp/ip

Let me know the details of protocol tcp/ip

Half-duplex and full-duplex mode of transmission, Question: a. State br...

Question: a. State briefly three reasons why computer networks are used? b. Differentiate between simplex, half-duplex and full-duplex mode of transmission. c. State any

Introduction to security and personnel, INTRODUCTION TO SECURITY AND PERSON...

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Differentiate between private key and public key encryption, Problem (...

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Implement database security, Question: (a) Describe fully with example ...

Question: (a) Describe fully with example the two access control methods available to implement database security. (b) Discuss why database statistics (meta data) provide es

Explain major differences between wpa and wpa2, Question: Suppose the f...

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Summarises the firewall protocols, Your rules should ensure that Internet a...

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

Future threats to network security and planning for those th, I need a help...

I need a help on how to write good assignment on the above topic

Classification of networks, Computer networks are defined by four factors w...

Computer networks are defined by four factors which are as given below: 1) NETWORK SIZE: According to the size of networks. 1) Local Area Network ( LAN) 2) Wide Area Ne

Arp message format, ARP MESSAGE FORMAT Although the ARP data packet fo...

ARP MESSAGE FORMAT Although the ARP data packet format is sufficiently general to allow hardware addresses and arbitrary protocol. ARP is almost usually used to bind a 32-bit

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd