.

Friday, June 14, 2019

Network Security Term Paper Example | Topics and Well Written Essays - 1500 words

Network Security - Term Paper Example(213) INTRODUCTION It consists of various policies to prevent the misuse of the data or unauthorised door of the data by exploiters who does not own it. Certain provisions and policies are made in this regard by the administrator, to ensure confidentiality of data .This system is so designed that authorization of admission fee to data in a net profit is controlled by the mesh topology administrator only without interference of any other person. For this purpose, any users are given a separate ID i.e. the identity of the individual and a password by the administrator so that access to information and programs are allowed by that user only within their authority. It is a complex job and tramp be tackled by efficient, experienced and well-trained experts. Network credential system is a combining of many computer networks which can be either public or private. It includes everyday jobs like conducting transactions and communications among busi nesses, government agencies and individuals. Networks can also be private, such as a network dealing a specific company, and others which might be open to public access. In organizations, enterprises, and other types of institutions Network security is involved so as to maintain the confidentiality of their data (King, 10). Role of Network Security How does it protects you It performs the key role as the name indicates as quoted by (Bragg et al) unaccredited access It secures the network, and does not allow any unauthorized access. Confidentiality It also plays a chief role in protecting and overseeing operations being done and preventing their unfathomed user access. A Unique Name Protection of a network resource requires the corresponding password and unique name as mentioned above in an earlier section. Executing Commands Illicitly It is undesirable for an unknown and non-trusted individual to execute and run the commands server machines. Security system doesnt allow any su ch activities. Protects the system from Viruses, worms and Trojan horses Many antiviruses are developed so that a secure system may be provided. Concept The key feature of network security is allocating the user, commonly with an authentic username and a password. One-factor authentication The password is something which known by the user only. This can he termed as one-factor authentication. Two- factor authentication This something the user already has can also be used as his identity. For an example, A security token An ATM card Mobile phone number every of the above belongings can be used as an individuals identity in a secured network. Three-factor authentication Every individual can be identified by something the user is. For an example, A fingerprint Retinal scan Firewall It enforces access policies blocking the unauthorized network access. For instance, which services may be allowed to be accessed by the user in certain network? This feature is plays a very helpful and effic ient role in preventing the unauthorized access to the data. The only drawback of this component is that it way fails to detect any potentially harmful error like Computer worms are being transmitted over the network (Radack, 215). Proxy According to Okechukwu et al.,( 480) Process of having one host act in behalf of