Network Sercurity Industry

862 Words2 Pages

Network Security
4th Block
With the upraise of Internet use around the world from businesses, private computers and networks there are bound to be people out there trying to get easy money. Hackers and viruses and just human error all represent a potential threat to your networks and sometimes more personal stuff like credit card numbers and social security numbers. This is where the Network Security industry comes into play; it protects your network from viruses, worms, Trojan Horses, spy ware, adware, hackers, denial of service attacks and Identity theft. Network security is one of the best things you could own, you could be arrested for something you didn’t even do, all because you didn’t get security and someone stole your identity and bought some illegal substances or services off the internet from a cop set up.

Network Security consists of multiple layers of security. If one fails, there are many back up firewalls to help. There are many key components that all have an key role in keeping your network a safe place to work or surf the web, those components are Anti –virus, anti-spy-ware, firewall, IPS, and VPNs.

Network security starts with authenticating or simply a password. Some networks also require a two -factor authentication like an ATM card or finger print. After your authenticated the fire wall enforces access polices such as what services you’re allowed to use. Though it’s effective for keeping out unauthorized, it sometimes over looks worms and Trojans.

The benefits of having security are your privacy is assured, and collaboration is encouraged. If you’re a business owner your business partners will fill more secure sharing ...

... middle of paper ...

...reate a secure environment for the exchange of data between network devices. It is a form of authentication and encryption. A key is generated and used for encryption and a certificate is generated and used to verify authentication.

Symmetric key encryption or secret key cryptography uses a key that only the sender and receiver know. Both the sender and receiver use the same code or encryption to encrypt and decipher the messages. The term symmetric is used because the same key is used to encode and decode the data sent.

Asymmetric key encryption uses to keys, a private and public one. Typically the originator of the encryption system owns the private key.

Certificate Authority contains the security list of users authorized to access the private key owner’s messages using a public key. The CA sends the requested information in the form of a digital certificate.

More about Network Sercurity Industry

Open Document