Network Security And it's Importance

 

1.what is the importance of security on computer network?

Network security is any action an organization takes to prevent malicious use, malfunction, modification, destruction, improper disclosure  or accidental damage to the network’s private data, its users, or their devices. The goal of network security is to keep the network running and safe for all legitimate users  and allows computers, users and programs to perform their permitted critical functions within a secure environment.

 

Importance :-

Network security is important for home networks as well as in the business world. Most homes with high-speed internet connections have one or more wireless routers, which could be exploited if not properly secured.  A solid network security system helps reduce the risk of data loss, theft and sabotage. Except that, some of the more importance of network security are as follow :

  • ·      Network security is any activity designed to protect the usability and integrity of your network and data which includes both hardware and software technologies.
  • ·      It targets a variety of threats.
  • ·      It stops them from entering or spreading on your network.
  • ·      Effective network security manages access to the network

  • ·      Network security helps protect our workstations from harmful spyware. It also ensures that the shared data is kept secure.
  • ·      Network security promotes reliability of your network by preventing lagging and downtimes through continuous monitoring of any suspicious transaction that can sabotage the system.
  • ·      Competent network security procedures keep data secure and block vulnerable systems from outside interference. This allows the network’s users to remain safe and focus on achieving the organization’s goals.


  • ·      Competent network security procedures keep data secure and block vulnerable systems from outside interference. This allows the network’s users to remain safe and focus on achieving the organization’s goals.

Comments

Popular posts from this blog

Waterfall Model (Theory)

Dynamic NAT vs Static NAT

Explain SDLC with phases