Network security is an applied scientific discipline [1] , the branch of computer science [2] .
Deals with the issues of ensuring the information security of a computer network and its resources, in particular, the data stored in and transmitted through it and the users working with it. It is an extension of computer security (as a discipline) and a subsection of information security . Engaged in the study and development of methods and practical rules for working with the network, including communication protocols and data exchange and cryptographic methods for protecting information [2] .
Among the risks to which a computer network is exposed and the prevention of which is the goal of network security as a discipline: unauthorized access to network resources (for example, unauthorized reading of files) and preventing attacks aimed at disabling certain services provided by the network (for example, preventing all or part of users to view the company's website) [3] .
In addition to discipline, the term “network security” can be understood as a set of procedures, standards, rules and tools designed to ensure the security of a computer network. Among both hardware and software tools and devices used for this purpose: firewalls (firewalls), antivirus programs , network monitoring tools, tools for detecting unauthorized access attempts (intrusion), proxy servers and authentication servers [4] .
Network security is an important aspect of any company. It is estimated that in 2003 alone, network attacks caused business damage of 666 million dollars [3] .
Notes
- ↑ Eric Stewart. CCNA Security Exam Cram (Exam IINS 640-553) . - Pearson Education, 24 October 2008. - P. 46–. - ISBN 978-0-7686-8683-8 .
- ↑ 1 2 Joseph Migga Kizza. Guide to Computer Network Security . - Springer, 9 February 2015. - P. 43–. - ISBN 978-1-4471-6654-2 .
Joseph Migga Kizza. Guide to Computer Network Security . - Springer Science & Business Media, December 17, 2008. - P. 45–. - ISBN 978-1-84800-916-5 . - 2 1 2 Visualizing Glyphs from a Service-oriented Perspective . - ProQuest, 2007. - P. 3–. - ISBN 978-0-549-42533-5 .
- ↑ Database Security . - Cengage Learning, 2011-07-12. - P. 5–. - ISBN 1-4354-5390-5 .
Literature
- What is network security? - Cisco Systems
- Of The Attacks Of Security Attacks - JackCola.org
- Joseph Migga Kizza. Computer Network Security . - Springer Science & Business Media, 2005-12-05. - P. 48–. - ISBN 978-0-387-25228-5 .
- J. Michael Stewart. Network Security, Firewalls and VPNs . - Jones & Bartlett Publishers, 2013-07-15. - P. 4–. - ISBN 978-1-284-03168-3 .
- Sean Convery. Network Security Architectures . - Cisco Press, 2004. - P. 6–. - ISBN 978-1-58705-115-9 .
- Wayne Lewis. LAN Switching and Wireless, CCNA Exploration Companion Guide . - Cisco Press, 2008-04-28. - P. 141–. - ISBN 978-0-13-287747-3 .
- EC-Council. Network Defense: Security Policy and Threats . - Cengage Learning, 2010-04-14. - P. 1–. - ISBN 1-133-16889-2 .
- Introduction to Network Security: Theory and Practice . - Wiley, 2015-07-10. - P. 27–. - ISBN 978-1-118-93950-5 .
- Owen Poole. Network Security . - Routledge, 2007-06-07. - P. 2–. - ISBN 978-1-136-37707-5 .
- Shaobo Zhong. Proceedings of the 2012 International Conference on Cybernetics and Informatics . - Springer Science & Business Media, 2013-08-23. - P. 1151–. - ISBN 978-1-4614-3872-4 .