Network Security - Part 1

We are living in the era which is known for information technology. Computer played a major role in the field of information technology. Computer makes the task of calculation, processing, computing and storing easy. There was a time when the computer security was not as important as the number of user was limited and these devices not connected on network. With the introduction of internet, more and more user connected with internet. The situation changes drastically in last few years. As we all of us know that it is extremely easy to compute and store data from computer rather than do it manually which is time consuming and costly. In present day scenario most of the work like bill payment, shopping, banking, mailing and messaging can be done from home.

What is Network Security

Security of our computer system resources from intentional as well as accidental destruction or disclosure is known as network security. These resources include the hardware, software, databases, infrastructure, files and directories in which information is secured. Network security helps us to protect these resources and make sure that only authorised user can access this information.

Why Network Security Required

As we are moving towards the advance technology, most of the criminal minds also using this technology to do crime. Due to increasing requirement of internet marketing, most of the computer connected with the network and these computers are vulnerable by the attacks of unauthorised user. These users can steal our personal details by entering in our system through network in unauthorised manner.

Which Types of Threats can Harm our System

There are various types of threats that can harm the information stored on your system. These threats include intentional as well as natural threats. Natural threats include the flood, earthquake and fire. These can damage our system and result in loss of our data. Intentional threats include virus attack, worm attack, password cracking, mail bomb, spamming, DoS attack, Trojan attack, spoofing, and system hacking and sniffing. These attacks not only destroy our data stored on system but also steal our data and misuse this data for personal benefits or harming others.

Article Posted By : savilView All Articles

Article Source :

http://www.veethi.com/articles/network-security---part-1-article-798.htm

Keywords :
network security , computer , virus , spoofing , hacking , sniffing , attack

Comments

Submit an Article

Related Articles