Abstract

More than one computer system interconnected through wired or wireless links forms a network. Apart from a variety of networking protocols, networks broadly use client-server or peer-to-peer architecture for linked devices to communicate with each other. A networking subgroup includes network security. It necessitates safeguarding the network architecture that links the network's core to the network's edge. Network protection includes the implementation of IT security protocols and the deployment of network applications and hardware to protect the network, its infrastructure, and all of its traffic against unwanted cyberattacks, to defend against unauthorized access to all IT assets and resources available through the network, and to ensure that approved users have adequate access to all IT assets and resources in order to work effectively. The rapid expansion of the computer network infrastructure provides customers with excellent convenience as well as new security challenges. The topic of network protection typically consists of network infrastructure security and data security. It specifically relates to the network system's security, privacy, integrity and availability of data information in the system. The challenge of network protection persists across all levels of the data network, and the purpose of network security is to protect the secrecy, transparency, integrity, stability, usability and auditability of the network.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.