blog




  • Essay / Network Security Industry - 862

    Network Security4th BlockWith the increase in Internet usage worldwide by businesses, private computers and networks, there are bound to be people who try to get money easily. Hackers, viruses, and simply human error all pose a potential threat to your networks and sometimes more personal items like credit card numbers and Social Security numbers. This is where the network security industry comes in; It protects your network against viruses, worms, Trojans, spyware, adware, hackers, denial of service attacks and identity theft. Network security is one of the best things you can own, you could be arrested for something you didn't even do, all because you didn't get security and someone stole your identity and purchased illegal substances or services over the Internet from a set up by a cop. Network security consists of several layers of security. If this fails, there are many fallback firewalls to help you. There are many key components that all play a key role in making your network a safe place to work or surf the web. These components are antivirus, anti-spyware, firewall, IPS and VPNs. Network security starts with authentication. or just a password. Some networks also require two-factor authentication, such as an ATM card or fingerprint. Once authenticated, the firewall enforces access policies such as which services you are allowed to use. Although it is effective in preventing unauthorized access, it sometimes overlooks worms and Trojans. The benefits of security are that your privacy is assured and collaboration is encouraged. If you are a business owner, your business partners will complete a more secure sharing...... middle of paper...... create a secure environment for data exchange between network devices. It is a form of authentication and encryption. A key is generated and used for encryption and a certificate is generated and used to verify authentication. Symmetric key encryption or secret key cryptography uses a key that only the sender and recipient know. Both the sender and the recipient use the same code or encryption to encrypt and decrypt messages. The term symmetric is used because the same key is used to encode and decode the data sent. Asymmetric key encryption uses private and public keys. Typically, the author of the encryption system owns the private key. The certificate authority contains the security list of users authorized to access messages from the private key owner using a public key. The CA sends the requested information in the form of a digital certificate.