Professional Documents
Culture Documents
Network security is a computer networking system policy to assure the security to its organization assets, software
and hardware resources. The term network security also emphasis on monitoring and controlling of unauthorized
access, misuse and any unwanted modification in the networking system.
The most common authentication process practiced everywhere is to assign an exclusive user ID and password to
the user for authentication and to access the resources of the network.
The term security is inclusive of both private and public domain networks like RTGS or NEFT through online
banking.
It also emphasizes on round the clock monitoring of the network to prevent the system from virus attacks, and any
misuse or modification in the database.
The best ways to manage security is to use advanced antivirus and anti-malware software and keep updating the
system at regular intervals of time.
The use of the Internet has been increased drastically, as we are moving even our day to day activities towards
complete digitalization. Due to the increase in the use of the Internet, hackers and attackers also become more
active and our networking system tends to a higher number of virus attacks.
Basically, the need for network security is to perform two tasks mainly, first is to secure the information from any
unauthorized access and the second is to provide the security to the data stored at PC or laptops not only for an
individual network but also on the shared or public domain networks.
Thus, there are many solutions, and out of which few are discussed below.
This is done by deploying DLP technology in which the network administrator restricts the employee’s access to the
information to prevent it from sharing to the outside world by blocking ports and sites for forwarding, uploading or
even printing information.
Therefore a highly skilled email security application which can scan the incoming messages for viruses and is
capable of filtering suspicious data and controlling the outflow of messages to prevent any kind of information loss
to the system is required.
#4) Firewalls:
These are an integral part of the networking system. It acts as a wall between two networks or between two
devices. It is basically a set of pre-defined rules which are used to prevent the network from any unauthorized
access.
Firewalls are of two kinds, i.e. hardware, and software. The software firewall is installed in the systems to provision
shield from various types of attacks as they filter, block and fix the unwanted creatures in the network.
The hardware firewall acts as a gateway between two networking systems so that only a particular pre-defined
user or traffic can access the network and its resources.
Intrusion prevention system (IPS): It is the network security system which contains some set of rules and by
following them you can easily figure out the threats and block them as well.
Hence it is necessary to install an antivirus on our device and people should download or upload the data from
reliable resources and that too from secured websites only.
This is done, so that in the worst case, if the data at any location is corrupted or deleted by a virus attack, then it
can be again reconstructed from any backup sources.
Various software which has inbuilt-advanced endpoint security features and is used for this purpose. This provides
seven layers of security inclusive of file reputation, auto-sandbox, web- filtering, antivirus software, and a firewall.
#9) Access Control:
The network should be designed in a way in which not everyone can access all the resources.
This is done by deploying a password, unique user ID and authentication process for accessing the network. This
process is known as access control as by implementing it we can control the access to the network.