What is Network Security?
The objective of the network is to send data among its users located locally or remotely.
Hence, it is possible that undesired users can hack the web and prove harmful to the
network or the user's health.
The network administrator should follow a few essential points to provide the network with
adequate security other than network-specific security, such as e-commerce. These are
- Networks are designed to share data. Therefore, it should configure the network to
identify shareable data and non-shareable data.
- The network must also clear with whom can share the shareable data.
- With the increase of network security, the cost for its management will also increase
accordingly. Therefore, it should establish a compromising level between security
and costs per the network security system policy requirement. This will hugely
depend upon the security level needed to apply in the network, overall security
requirements and the effective implementation of the chosen security level.
- Division of the network security responsibilities should be clearly defined between
the user and the network administrator.
- The security requirement should be detailed within the organization’s network
security policy that denotes the valuable information and its associated cost to the
- After describing the detailed network security policy and identifying the
organization’s clear cut responsibilities, it should make the network administrator
responsible for providing that the security policy is effectively used in the company
environment, containing the existing networking infrastructure
There are various network security issues which are as follows:
- Confidentiality − It should protect it from unauthorized internal users prying eyes,
external hackers, and from being intercepted during transmission on
- Integrity − On retrieval or receipt at the other end of an interaction network, the
data should appear exactly as was sent.
- Availability − The data saved or transmitted across communication networks must
be available whenever needed and to whatever extent as acquired within preestablished time constraints.
- Authenticity − When a message is received, it should be possible to verify whether
it has indeed been transmitted by the person or object claiming to be the originator.
- Non-Repudiability − After sending/authorizing a message, the sender should not
be able to, at a later date, deny having done so. Similarly, the recipient of a
message should not be able to deny receipt at a later date.
- Auditability − Audit data must be recorded to meet all specified confidentiality and
Published on 04-May-2021 13:39:04