It defines the procedure of providing security on network and network resources. It contains handling the security services on a resource by using access control, authentication, confidentiality, integrity, and non-repudiation. Computer network security includes measures taken by a business or various systems to monitor and avoid unauthorized access from external attackers.
Network security is the security designed to preserve the integrity of the network from unauthorized connection and threats. The network administrators are responsible for adopting various defensive measures to guard their networks from possible security risks.
Computer networks are connected in daily transactions and connections inside the government, private, or corporate that require security. The simple and straightforward method of securing network support is allocating it with a unique name and a matching password.
The network security consists of the following −
Protection − The user should be able to configure their devices and networks accurately.
Detection − The user must detect whether the configuration has changed or get a notification if there is any problem in the network traffic.
Reaction − After detecting the problems, the user must respond to them and must return to a protected position as quickly as possible.
There are various services of network security which are as follows −
Message confidentiality or privacy defines that the sender and the receiver expect confidentiality. The transmitted message should create sense to only the predetermined receiver.
Message integrity defines that the data should appear at the receiver exactly as they were transmitted. There should be no changes during the transmission, neither unintentionally nor sarcastically. As increasingly monetary exchanges appear over the web, integrity is essential.
Message authentication is a service beyond message integrity. In message authentication, the receiver wants to be sure of the sender's existence and that an imposter has not transmitted the message.
Message nonrepudiation defines that a sender should not be capable of denying sending a message that he or she did send. For example, when a customer sends a message to transfer money from one account to another, the bank must have proof that the customer requested this transaction.
In entity authentication (or user identification), the entity or user is verified before access to the system resources (files, for example). For example, a candidate who requires accessing the university resources is required to be authenticated during the logging procedure. This is to protect the interests of the university and the student.