What is Network Security?

The objective of the network is to send data among its users located locally or remotely. Hence, it is possible that undesired users can hack the web and prove harmful to the network or the user's health.

The network administrator should follow a few essential points to provide the network with adequate security other than network-specific security, such as e-commerce. These are given below:

  • Networks are designed to share data. Therefore, it should configure the network to identify shareable data and non-shareable data.
  • The network must also clear with whom can share the shareable data.
  • With the increase of network security, the cost for its management will also increase accordingly. Therefore, it should establish a compromising level between security and costs per the network security system policy requirement. This will hugely depend upon the security level needed to apply in the network, overall security requirements and the effective implementation of the chosen security level.
  • Division of the network security responsibilities should be clearly defined between the user and the network administrator.
  • The security requirement should be detailed within the organization’s network security policy that denotes the valuable information and its associated cost to the business.
  • After describing the detailed network security policy and identifying the organization’s clear cut responsibilities, it should make the network administrator responsible for providing that the security policy is effectively used in the company environment, containing the existing networking infrastructure


There are various network security issues which are as follows:

  • Confidentiality − It should protect it from unauthorized internal users prying eyes, external hackers, and from being intercepted during transmission on communication networks.
  • Integrity − On retrieval or receipt at the other end of an interaction network, the data should appear exactly as was sent.
  • Availability − The data saved or transmitted across communication networks must be available whenever needed and to whatever extent as acquired within preestablished time constraints.
  • Authenticity − When a message is received, it should be possible to verify whether it has indeed been transmitted by the person or object claiming to be the originator.
  • Non-Repudiability − After sending/authorizing a message, the sender should not be able to, at a later date, deny having done so. Similarly, the recipient of a message should not be able to deny receipt at a later date.
  • Auditability − Audit data must be recorded to meet all specified confidentiality and integrity requirements.