Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
97 views3 pages

Network Security

Network security involves protecting a company's infrastructure from threats by preventing unauthorized access and damage. There are various types of network security like access control, antivirus software, firewalls, and intrusion prevention systems. Network security provides benefits such as protecting client data, reducing losses from incidents, and maintaining organizational reputation. Standards help create policies to avoid risks, identify threats, and respond to incidents across the security program. Wireless security similarly focuses on preventing unauthorized access to wireless networks and their devices. There are different wireless encryption protocols including WEP, WPA, WPA2, and the newest WPA3, with each iteration providing stronger security than the last.

Uploaded by

Subash .S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views3 pages

Network Security

Network security involves protecting a company's infrastructure from threats by preventing unauthorized access and damage. There are various types of network security like access control, antivirus software, firewalls, and intrusion prevention systems. Network security provides benefits such as protecting client data, reducing losses from incidents, and maintaining organizational reputation. Standards help create policies to avoid risks, identify threats, and respond to incidents across the security program. Wireless security similarly focuses on preventing unauthorized access to wireless networks and their devices. There are different wireless encryption protocols including WEP, WPA, WPA2, and the newest WPA3, with each iteration providing stronger security than the last.

Uploaded by

Subash .S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Network Security

Definition:
Network security is a set of technologies that protects the
usability and integrity of a company's infrastructure by
preventing the entry or proliferation within a network of a wide
variety of potential threats.
Types of Network Security:
The few types of network securities are discussed below:
 Access Control
 Antivirus and Anti-Malware Software
 Cloud Security
 Email Security
 Firewalls
 Application Security
 Intrusion Prevention System(IPS)
Benefits of Network Security:

Network Security has several benefits, some of which are


mentioned below:
1. Network Security helps in protecting clients’ information and
data which ensures reliable access and helps in protecting the
data from cyber threats.
2. Network Security protects the organization from heavy losses
that may have occurred from data loss or any security
incident.
3. It overall protects the reputation of the organization as it
protects the data and confidential items.

Architecture and Standards:


 The standards help create mechanisms by which the policies are
enacted in order to avoid risks, identify threats, and take action in
the event of an incident.
 These policies and standards apply to different areas of the
security program that stretch out across the entire organization.
Wireless Security:
Wireless security is the prevention of unauthorized access or
damage to computers or data using wireless networks, which
include Wi-Fi networks. The term may also refer to the protection of
the wireless network itself from adversaries seeking to damage the
confidentiality, integrity, or availability of the network.

Types of Wireless Security:


Wireless security encryption is mainly divided into four main types:
 Wired Equivalent Privacy Protocol (WEP)
 Wi-Fi Protected Access Protocol (WPA) 
 Wi-Fi Protected Access 2 Protocol (WPA2) 
 Wi-Fi Protected Access 3 Protocol (WPA3)

1. WEP Protocol : Wired Equivalent Privacy Protocol abbreviated as


WEP, was initially originated in the 1999 and is considered the standard
for wireless security encryption. It is less found in today’s modern world
because of the risk of security it is associated with directly/ indirectly.
WEP is not considered stable and Wi-Fi discontinued its use in 2004
because it is easy to exploit this level of security.
Example: Security added in the LAN connections to protect from
unauthenticated users trying to breach privacy.
2. WPA Protocol: WEP was succeeded by Wi-Fi Protected Access
Protocol abbreviated as WAP which offers more security and safety.
WPA has a 128-bit dynamic key called Temporary Key Integrity Protocol
(TKIP) that’s hard to break and makes it unique. One noticeable
disadvantage of WPA was that since it was made for WEP-enabled
devices, so the core components were majorly the same for WPA and
WEP.
3. WPA 2 Protocol : Wi-Fi Protected Access 2 Protocol abbreviated as
WPA2 came next and was better than the previous encryption types.
Here, Temporary Key Integrity Protocol (TKIP) was replaced by Counter
Mode Cipher Block Chaining Message (CCMP).  It is one of the most
used security encryption types.  In 2006, WPA2 was declared to be
used in all wi-fi devices for wireless security encryption. WPA2 offers
Advanced Encryption Standards (AES).  However, the major
disadvantage of WPA2 is that if the security key reached the hands of
the hacker then the entire network is vulnerable to attack.
4. WPA3 Protocol: WPA3 or Wi-Fi Protected Access 3 (WPA3)
Protocol is the newest security encryption that’s gaining popularity.
WPA3 offers high protection and prevents unauthorized access.
Unauthenticated and unauthorized individuals can’t breach this level of
security. WPA3 is the most desired for public networks as it performs
automatic encryption.  

You might also like