Network security is the process of securing the network infrastructure from unauthorized access. Nowadays everyone relies on the internet to carry out personal and professional tasks, but have you stopped to think if your network is secure? Some people out there want to attack computers connected to the internet, therefore If you fail to take necessary steps to prevent this from happening, your privacy will be violated. Businesses use a network of computers to carry out day to day tasks, As a result, network security has become a main topic in cyber security resulting in implementing network security measures for businesses to perform their day to day tasks in a secure environment.
A network attack is a method used to maliciously attempt to compromise network security, Firstly let’s look at the types of network attacks.
Active attacks
In an active attack, the attacker will try to change the data transferring over a network. For example: If you send a message to your friend via a network which is not secure, then there can be more people in this network, In other words You, your friend and the attacker. As a result, the Attacker has the ability to change the content in your message.
Therefore, Active attacks are aggressive attacks.
Passive attacks
A passive attack involves the attacker monitoring the system without any affect to the system resources. For instance: You are sending a message to your friend through a network which is not secure against attacks, however, an attacker who is in the same network as you and your friend can see the message. If you send any sensitive information such as bank account details then the attacker can collect the information. Therefore, The purpose of a passive attack is to gain access to the system without detection.
There are a many components to a network security system so Let’s discuss about some of them.
These are the fundamentals of network security but Let’s dive deeper into this topic in another article.
References
1.Edureka. (2018). What is Network Security | Fundamentals of Network Security. [online] Available at: https://www.edureka.co/blog/what-is-network-security/#NetworkSecurity [Accessed 6 Mar. 2020].
2. www.guru99.com. (n.d.). Types of Computer Networks: LAN, MAN, WAN, VPN. [online] Available at: https://www.guru99.com/types-of-computer-network.html.
3.Comtact (n.d.). The causes of network downtime: What are they!? [online] www.comtact.co.uk. Available at: https://www.comtact.co.uk/blog/the-causes-of-network-downtime.
Source: https://www.cio.com/article/3550265/from-risk-to-reward-mastering-the-art-of-adopting-emerging-technologies.html Innovation in technology can feel like a double-edged sword. On one side, groundbreaking…
Source: https://aws.amazon.com/blogs/enterprise-strategy/how-executives-can-avoid-being-disrupted-by-emerging-technologies/ In a world of constant technological evolution, businesses face the challenge of navigating…
Source: https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2024/volume-17/emerging-technology-key-challenges-and-opportunities Teens doing experiments in robotics in a laboratory. Boy in protective glasses using…
n the first part of this series, we explored the transformative potential of Artificial Intelligence…
Source: https://www.pwc.com/us/en/tech-effect/emerging-tech/essential-eight-technologies.html As businesses embrace digital transformation, emerging technologies play a pivotal role in shaping…
Source: https://www.gartner.com/en/articles/30-emerging-technologies-that-will-guide-your-business-decisions As businesses navigate an ever-evolving technological landscape, emerging technologies have the potential to…