Networking security?
Wed Feb 17, 2016 12:51 pm
Network security is a complicated subject, historically only tackled by well-trained and experienced experts. However, as more and more people become ``wired'', an increasing number of people need to understand the basics of security in a networked world. This document was written with the basic computer user and information systems manager in mind, explaining the concepts needed to read through the hype in the marketplace and understand risks and how to deal with them.
Some history of networking is included, as well as an introduction to TCP/IP and internetworking . We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices.
This is not intended to be a ``frequently asked questions'' reference, nor is it a ``hands-on'' document describing how to accomplish specific functionality.
It is hoped that the reader will have a wider perspective on security in general, and better understand how to reduce and manage risk personally, at home, and in the workplace.
Some history of networking is included, as well as an introduction to TCP/IP and internetworking . We go on to consider risk management, network threats, firewalls, and more special-purpose secure networking devices.
This is not intended to be a ``frequently asked questions'' reference, nor is it a ``hands-on'' document describing how to accomplish specific functionality.
It is hoped that the reader will have a wider perspective on security in general, and better understand how to reduce and manage risk personally, at home, and in the workplace.
- Mark0
- Posts : 76
Join date : 2016-01-28
Re: Networking security?
Wed Feb 17, 2016 1:00 pm
Networking security is main infrastructural feature of any networked system. This system is designed to restrain network attacks and maintenance properly.
Re: Networking security?
Wed Feb 17, 2016 2:52 pm
Network security involves practices that reduce the risk of having information get into the wrong hands or preventing unwanted programs or individuals from distrupting your quality of service. This can be achieved in three ways
- Physical Security
- Application Security
- Hardware Security.
cryptography tools
- Physical Security
- Application Security
- Hardware Security.
cryptography tools
Permissions in this forum:
You cannot reply to topics in this forum