Chapter Abstract:
Summary More than one computer system interconnected through wired or wireless links forms a network. Apart from a variety of networking protocols, networks broadly use c...Show MoreMetadata
Chapter Abstract:
Summary
More than one computer system interconnected through wired or wireless links forms a network. Apart from a variety of networking protocols, networks broadly use client‐server or peer‐to‐peer architecture for linked devices to communicate with each other. A networking subgroup includes network security. It necessitates safeguarding the network architecture that links the network's core to the network's edge. Network protection includes the implementation of IT security protocols and the deployment of network applications and hardware to protect the network, its infrastructure, and all of its traffic against unwanted cyberattacks, to defend against unauthorized access to all IT assets and resources available through the network, and to ensure that approved users have adequate access to all IT assets and resources in order to work effectively. The rapid expansion of the computer network infrastructure provides customers with excellent convenience as well as new security challenges. The topic of network protection typically consists of network infrastructure security and data security. It specifically relates to the network system's security, privacy, integrity and availability of data information in the system. The challenge of network protection persists across all levels of the data network, and the purpose of network security is to protect the secrecy, transparency, integrity, stability, usability and auditability of the network.
Page(s): 75 - 95
Copyright Year: 2023
Edition: 1
ISBN Information: