
- DCN Tutorial
- Data Comm & Networks Home
- DCN - Overview
- DCN - Computer Network Types
- DCN - Network LAN Technologies
- DCN - Computer Network Topologies
- DCN - Computer Network Models
- DCN - Computer Network Security
- Physical Layer
- DCN - Physical Layer Introduction
- DCN - Digital Transmission
- DCN - Analog Transmission
- DCN - Transmission media
- DCN - Wireless Transmission
- DCN - Multiplexing
- DCN - Network Switching
- Data Link Layer
- DCN - Data Link Layer Introduction
- DCN - Error detection and Correction
- DCN - Data Link Control & Protocols
- Network Layer
- DCN - Network Layer Introduction
- DCN - Network Addressing
- DCN - Routing
- DCN - Internetworking
- DCN - Network Layer Protocols
- Transport Layer
- DCN - Transport Layer Introduction
- DCN - Transmission Control Protocol
- DCN - User Datagram Protocol
- Application Layer
- DCN - Application Layer Introduction
- DCN - Client-Server Model
- DCN - Application Protocols
- DCN - Network Services
- DCN Useful Resources
- DCN - Quick Guide
- DCN - Useful Resources
What is Network Security?
The objective of the network is to send data among its users located locally or remotely. Hence, it is possible that undesired users can hack the web and prove harmful to the network or the user's health.
The network administrator should follow a few essential points to provide the network with adequate security other than network-specific security, such as e-commerce. These are given below:
- Networks are designed to share data. Therefore, it should configure the network to identify shareable data and non-shareable data.
- The network must also clear with whom can share the shareable data.
- With the increase of network security, the cost for its management will also increase accordingly. Therefore, it should establish a compromising level between security and costs per the network security system policy requirement. This will hugely depend upon the security level needed to apply in the network, overall security requirements and the effective implementation of the chosen security level.
- Division of the network security responsibilities should be clearly defined between the user and the network administrator.
- The security requirement should be detailed within the organization’s network security policy that denotes the valuable information and its associated cost to the business.
- After describing the detailed network security policy and identifying the organization’s clear cut responsibilities, it should make the network administrator responsible for providing that the security policy is effectively used in the company environment, containing the existing networking infrastructure
Issues
There are various network security issues which are as follows:
- Confidentiality − It should protect it from unauthorized internal users prying eyes, external hackers, and from being intercepted during transmission on communication networks.
- Integrity − On retrieval or receipt at the other end of an interaction network, the data should appear exactly as was sent.
- Availability − The data saved or transmitted across communication networks must be available whenever needed and to whatever extent as acquired within preestablished time constraints.
- Authenticity − When a message is received, it should be possible to verify whether it has indeed been transmitted by the person or object claiming to be the originator.
- Non-Repudiability − After sending/authorizing a message, the sender should not be able to, at a later date, deny having done so. Similarly, the recipient of a message should not be able to deny receipt at a later date.
- Auditability − Audit data must be recorded to meet all specified confidentiality and integrity requirements.
- Related Articles
- What is a Network Security?
- What Is Network Security Management in information security?
- What are network based attacks and network security threats?
- What are the network security types?
- What are the services of Network Security in Computer Network?
- Network Perimeter Security Design
- What are the Network Security threats and attacks?
- What are security features of the 4G cellular network?
- What are the types of Network in Information Security?
- Top Network Security Interview Questions
- What are the security issues of using a trusted network?
- Difference Between Cybersecurity and Network Security
- Voice Biometric Technique in Network Security
- Network Security: Basics, How to Implement
- What are the attributes of a secure network in information security?

Advertisements