Please enable JavaScript.
Coggle requires JavaScript to display documents.
Securtiy over network - Coggle Diagram
Securtiy over network
real world examples
-
Data Loss Prevention
The MNC's or large-scale organizations, maintain the confidentiality of data and resources by making sure that their internal information will not be leaked out by any of the employees to the outside world.
Email Security
The attackers can induce the virus or malware in the network by sending it through an e-mail in the system.
Firewalls
These are an integral part of the networking system. It acts as a wall between two networks or between two devices. It is basically a set of pre-defined rules which are used to prevent the network from any unauthorized access.
Network Segmentation
For the security point of view, a software-based organization will segment their crucial data into two-or-three parts and keep them at various locations and on several resources or devices.
Mobile Security
The cyber-criminals can easily hack or attack the mobile handsets with the data facility on the handsets, and they can enter into the device from any unsecured resource link from the website.
Web Security
Web security refers to provisioning limited access to websites and URLs by blocking the sites which are more vulnerable to viruses and hackers. Thus it is basically concerned with controlling the web-based threats.
Virtual Private Network
A system can be made highly secure by using VPN networks in association with using encryption methods for authentication and floating data traffic over the Internet to a remotely connected device or network. IPSec is the most commonly used authentication process.
what is it
policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.
-
why is it important
helps business reduce the risk of falling victim of data theft and sabotage. Network security helps protect your workstations from harmful spyware. It also ensures that shared data is kept secure.