110 likes | 118 Views
<br>Network security ranges from protection at personal level via various tools to global ethical regulations that govern cyber security at international levels. Now there are various special tricks and techniques via which we can protect our account, website, etc from these cyber attacks. <br>
E N D
NETWORK SECURITY A boon for a secured virtual space
INTRODUCTION With more than 4.1 billion users across the world, the internet and digital technology has swapped almost all spheres of human lives and thereby remaining up-to-date with contemporary technology becomes vital. With this great use , scope and span ; the internet also brings with itself black intentions of hackers and thereby network security becomes a major aspect to be considered.
WHAT ARE THESE THREATS? Cyber threats are the threats from various malicious softwares and software attackers which include • Viruses • Trojan horses • Malware • Spyware and Adware • Rogue Security Software • Ransomware • Phishing • Hacking and cracking,etc
The solution to our problem NETWORK SECURITY Prevention , protection and post-attack measures are the three broader approaches that we can employ to remain secure. Security can be achieved at personal level via some simple tools and basic awareness and at global level via strict cyber laws.
Network security techniques : • Antivirus It is an software program that is employed in any system to prevent any malicious activity It can be downloaded or purchased for securing systems against malicious attacks. It detects and removes malware and thereby helps us protect our system.
Firewall These are used to protect internal/private networks. They can also be used to govern activities taking place within the network. • Intrusion Detection System These are another major activity control system that can be used to detect and report any unnecessary activity that takes place over the network.
Setting strong password This technique can be employed at personal level via some basic awareness while setting password which are • Use at least 4 characters • Use special characters along with regular alphabets • Initials from lines from any adage or any saying which is very personal to you can be used to set password • Never share your password with anyone; if done then change your password as early as possible to prevent any misuse.
Virtual Private Networks(VPNs) These involve encryption process to attain security. They are used to obtain privacy and data security over the internet via hiding your IP address and physical location. • Email security application It is an application specific protection technique. A safe mailing environment free of spams can be achieved via this as it blocks phishing, viruses, worms, etc. that may cause email security threats.
IT Security Frameworks They are used by private companies with good employee base to manage security within the entreprise. Various companies depending on their size and security needs use this technique to ensure that things go safe within the organization.
Conclusion Various other techniques like data loss prevention, network segmentation, behavioral analytics, endpoint security, etc. can be used to protect the network. Network security encompasses awareness at personal level much more than regulations; but strict action needs to be taken against any malicious activity if detected in order to obtain a safe virtual world. Regards, Technology Moon