0% found this document useful (0 votes)
22 views

Network Security Consists of The: Policies Authorized Computer Network

Network security consists of policies and technologies used to secure computer networks, including authorization of access to data, which is controlled by a network administrator. It involves protecting both private networks within organizations as well as public networks, and covers a variety of networks used for everyday jobs, business transactions, government communications, and more. The most basic way of securing a network is by assigning unique usernames and passwords to control access to resources.

Uploaded by

Jash
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Network Security Consists of The: Policies Authorized Computer Network

Network security consists of policies and technologies used to secure computer networks, including authorization of access to data, which is controlled by a network administrator. It involves protecting both private networks within organizations as well as public networks, and covers a variety of networks used for everyday jobs, business transactions, government communications, and more. The most basic way of securing a network is by assigning unique usernames and passwords to control access to resources.

Uploaded by

Jash
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Network security consists of the policies adopted to prevent and monitor authorized access,

misuse, modification, or denial of acomputer network and network-accessible resources. Network


security involves the authorization of access to data in a network, which is controlled by the network
administrator.[citation needed] Users choose or are assigned an ID and password or other authenticating
information that allows them access to information and programs within their authority. Network
security covers a variety of computer networks, both public and private, that are used in everyday
jobs; conducting transactions and communications among businesses, government agencies and
individuals. Networks can be private, such as within a company, and others which might be open to
public access. Network security is involved in organizations, enterprises, and other types of
institutions. It does as its title explains: It secures the network, as well as protecting and overseeing
operations being done. The most common and simple way of protecting a network resource is by
assigning it a unique name and a corresponding password.

You might also like