You are on page 1of 2

Network Security: It is a process, not a product

Jaymark B. Marcos
ABSTRACT
enterprises are a must Network security originally focused on algorithmic aspects such
as encryption and hashing techniques. While these concepts rarely change, these
skillsW ith the explosion of the public Internet and e-commerce, private computers and
computernetworks, if not adequately secured are increasingly alone are insufficient to
protect computer networks. As crackers hacked away at networks and systems,
security courses arose that emphasized the latest attacks. There isvulnerable to
damaging attacks. Hackers, viruses, always fault management, fault software, abuse of
resourcesvindictive employees and even human error all represent connecting to
computer networks. These are the mainclear and present dangers to networks. And all
reasons which cause security problems for a Network.computer users from the most
casual Internet surfers to Today, security problem becomes one of the main
problemslarge enterprises could be affected by network security for computer network
and internet developing. However, there is no simple way to establish a secure
computerbreaches. However, security breaches can often be easily network. In fact, we
cannot find a network in the world,prevented. How? This white paper provides you an
which does not have any security holes nowadays. Theoverview of the most common
network security threats infrastructures of cyberspace are vulnerable due to threeand
its solution which protects you and your kinds of failure: complexity, accident, and
hostile intent.organization from threats, hackers and ensures that the Hundreds of
millions of people now appreciate a cyberdata traveling across your networks is safe.
context for terms like viruses, denial of service, privacy, worms, fraud, and
crime more generally.Some history of networking is included, as well as an Attacks so
far have been limited. While in some networkintroduction to TCP/IP and
internetworking. We go on attacks the value of losses is in the hundreds of millions,to
consider risk management, network threats, firewalls, damage so far is seen as
tolerable.and more special-purpose secure networking devices. While preventing
attack is largely based on government authority and responsibility, the detailed

knowledge needed to thwart an attack on a cyber system to prevent damageINDEX


TERMS: Security, Audit, Coupled stages. rests primarily with its owner. Protecting
infrastructure systems arguably involves five

You might also like