B.Sc. CSIT 7th Semester Network Security

How to secure the Computer Network?

Introduction

Prior to the extensive usage of data processing technology, an organisation’s information was protected largely through physical and administrative measures. The necessity for automated solutions to secure files and other information kept on computers became apparent with the emergence of the computer. The emergence of distributed systems and the usage of networks and communications facilities for transferring data between a terminal user and a computer, as well as between computers, has had a significant impact on security.

Security Categories

Computer Security

  • Defending the system from harmful software and network threats.
  • A generic term for a group of tools aimed at securing data and preventing hacking.
  • Maintain the system’s functionality.

Network Security

  • Defending data against intruders while it is being sent.
  • Defending Network Services Against Intruders

Information Security

  • Protecting information against intruders who may do harm to the information system. 
  • The most extensively utilised method of security is information in encrypted form.

Internet Security

  • Measures used to secure data while it is being transmitted via a network of interconnected networks.

Network Security

Information, as well as the systems and hardware that use, store, and transfer that information, is protected by network security. The study of computer network security is a subset of computer security. It’s still a branch of computer science, but it’s far more wide than computer security. It entails constructing an environment in which a computer network, with all of its numerous resources, may operate. It refers to the procedures used to ensure the confidentiality, integrity, and availability of data or resources.

How to secure the Computer Network?

Protecting hardware

Protecting hardware resources includes protecting:

  • All client system input components, including a keyboard, mouse, touchscreen, light pens, and others, are considered end user objects.
  • Hackers can access network components such as firewalls, hubs, switches, routers, and gateways.
  • Eavesdroppers are prevented from eavesdropping network conversations by using network communication channels.

Protecting Software

Protecting software resources includes protecting:

  • Hardware-based software, operating systems, server protocols, browsers, application software, and intellectual property stored on network storage disks and databases.
  • Client software such as investment portfolios, financial data, real estate records, images or pictures, and other personal files commonly stored on home and business computers
About Author

Sarina Sindurakar