Related Articles

Related Articles

Protection Methods for Network Security
  • Last Updated : 14 May, 2020

In today’s generation, communication and sharing information are the key to success. Here, the network means the interconnection of two or more computers. This networking is very beneficial in many fields like exchanging information, sharing resources such as printers and scanners, sharing software, etc. Security means protection, safety, measures taken to be safe from harm caused by others. Network security is similar. Network security means some measures taken to protect computer networking from unauthorized access and risks.

Some protection methods are used to reduce security issues.

  1. Authentication :
    Authentication is the process of recognizing or identifying a user’s identity whether it is true, real, or not. It’s simply a verification of claim whether you are who you say you are or not. There are many authentication methods available nowadays like password authentication that includes using a password, physical authentication that includes the scannable card or smart card or digital certificate, biometric authentication that includes signatures and fingerprints, or visual identification, and many more.

  2. Authorization :
    Authorization means to ensure whether you have permission to access on network or not. It’s simply a verification of permission either user has access or not. Some authorization methods are ACLs (Access Control Lists), Secure objects and methods, Access control for URL’s, etc.

  3. Biometric System :
    A Biometric system is one of the most secure systems as it provides high security to the computer network. This system verifies the user’s identity based on some important characteristics that are physiological and behavioral features. Physiological features include face, eyes, fingerprints, hand. Behavioral features include voice, signature, etc.

  4. Firewall :
    A firewall is a method of network security that prevents the computer network from users that are not authorized to have access to a network. Firewalls can either be hardware or software or both. It acts as a barrier between unauthorized Internet users and private computer networks connected to the Internet. It blocks the message, viruses, hackers if they do not have authorized access and do not meet the security criteria as per requirement. Any message entering or leaving private computer networks connected to the Internet especially Intranet pass through the firewall. Firewall than checks each message and block if found unauthorized. There are several types of firewall techniques:

    • Packet Filter
    • Application-level gateway
    • Circuit-level gateway
    • Stateful inspection firewall
    • Next-Generation Firewall (NGFW)
    • Proxy server

Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.

My Personal Notes arrow_drop_up
Recommended Articles
Page :