Internet security

Page 1

Network Security


Chapter goals

1. What is a network? 2. Why do we need network security? 3. What is vulnerability? 4. Firewall as network security 5. Conclusion


What is a network? A network is a series of nodes interconnected to each other by communication paths. Each computer is a network which is connected to other network using wired connection or a wireless connection such as Wi-Fi. The best example for a network is internet. A router network is required to connect internet with one or many computer networks together.


Network security and its uses

Network security is a set of policies which blocks vulnerabilities such as unauthorized access to the computer networks. It is mainly developed to avoid thefts, misuse of computer, etc. If one network is affected, there are wide chances to affects the other networks which are interconnected.


Network security and its uses When network security software such as firewall is installed in a computer network, the connections that it receives are well scanned by the firewall software and accepts the connection only if it is found safe. The rest of the connections which are unsafe are denied to enter the network. By this method our computer, and devices that are connected to computer can be kept safe and the data can be protected.


What is vulnerability? Vulnerability in computer network is a weakness in security that are exposed to attacks by hackers or intruders. A risk in computer network can be named as a vulnerability.


Firewall as network security

Firewall is a network security software which acts as a protecting barrier against threats from attackers to exploit the computer network. Computers can be attacked using external devices such as pendrive, hard-disk, CDs, etc. Through which malware is sent to the system and the hackers takes full control over the system and destroys the computer.


Firewall as network security

Another way is through wireless connection such as internet. Internet is a network that connects thousands and thousands of network together. Now a days, malicious software are passed by sending email spam, by visiting untrusted domains, downloading malicious files, etc. A firewall is used to block the unauthorized access to the system. The network that a computer receives to connect is well scanned by the firewall present in the computer, the data is sent to the computer only if the data obeys the following rules programmed in the firewall software.


Conclusion

With an increase in online attacks, it is mandatory to have security software such as firewall installed to secure and protect the network from hackers.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.