NETWORK SECURITY FUNDAMENTALS: CONCEPTS, TECHNOLOGIES, AND BEST PRACTICES

· · ·
· Xoffencerpublication
Ebook
236
Pages
Ratings and reviews aren’t verified  Learn More
26% price drop on Jul 1

About this ebook

In order to have a complete understanding of the function that ISA Server plays in network security, it is necessary to first have a broad understanding of what network and Internet security entails, why it is vital, and how it may be achieved by means of an all-encompassing security policy. Only then will you be able to understand how firewalls work and how functions. After that, you will be able to comprehend the operation of ISA in addition to the workings of firewalls. Within the realm of information technology (IT), network security is a pressing problem that is also rapidly becoming into a prominent (and often lucrative) area of specialized knowledge and experience. Users of the internet who are technically savvy frequent in large numbers websites that place a strong emphasis on data protection. There has been a rise in the frequency with which certifications that are concerned with security are adopted. Biometric identification and verification used to be the realm of science fiction writers and maybe a few highly secret government agencies, but in today's day and age, such arcane security measures are considered to be standard operating procedure in corporate America. In spite of all of the attention that is being given to security, many firms continue to install security measures in a way that is almost wholly random. There is no system that has been well-thought-out to ensure that all of the components are compatible with one another, and this is a problem. Only two of the numerous sides that are covered in computer security are the protection of the physical hardware as well as the electrical bits and bytes that make up the information that is stored on the network. Computer security also includes the protection of many other aspects. In the following sentence, we will provide a high-level overview of what we mean when we speak about "security" and how it pertains to your computer network. This will be followed by a review of some of the key points. This term may be a little misleading when it comes to the safety of computers and networks since it indicates a degree of protection that is essentially unreachable in the connectivity-oriented computing world of today. Because of this, the same dictionary 1 | P a ge gives yet another meaning that is unique to computer science. This definition is as follows: "The degree to which a program or device is protected from being used in an unauthorized manner" [italics added]. This definition contains the unstated stipulation that the aims of security and accessibility, the two primary concerns on the minds of many network managers, are, by their very natures, diametrically opposed to one another. This is an implicit caveat in the definition. The accessibility and protection of users' data are often cited as the two most important concerns of network administrators. Your data will have a lower level of protection if it is easier for unauthorized parties to have access to it. In a same vein, if you guard it with a higher level of vigilance, you will make it harder for anybody to have access to it. Every strategy for achieving security entails some level of work to locate a happy medium between the two poles of the spectrum. You will need to familiarize yourself with the terminology that security professionals use in order to appreciate the fundamentals; similarly, this is the case in any other specialized sector that you may be interested in. At the end of this, you will discover a list of some common phrases that you are likely to come across when working in the subject of information technology security. If you are just starting out in the industry, the information on this list will be useful to you. A well-known hacker's slogan is "Hack the world!" Other well-known hacker slogans are "Information wants to be free" and the simpler but more positive "Information wants to be free." The fact of the issue is, however, that it is relevant not only to those people who are trying to acquire access to material that they are not permitted to examine, but also to those people who are attempting to secure themselves from the trespassers. This is because the reality of the matter is that it is applicable to both groups of people. The old adage "Know thy enemy" is still the first and most crucial stage in winning any fight, and network security is a war over who owns and controls the information on your computer. Therefore, it is essential to have a thorough understanding of your adversary. This piece of wisdom has been passed down from generation to generation since the beginning of time. In order to prevent the theft of network resources, damage to those resources, or exposure of those resources when it is not necessary, you need to have a knowledge of who initiates these actions, why they do it, and how they do it.

About the author

Dr. Satvika obtained his doctorate in the field of Artificial Intelligence (Sentiment Analysis). She has done her Master of Technology degree in Computer Science Engineering from Chaudhary Devi Lal University, Sirsa. Since 2006, she has worked as an Assistant Professor in the Computer Engineering department at The Technological Institute of Textile and Sciences, Bhiwani, Haryana, India's. She has published more than 40 research papers in top international journals and myriad International and National Conferences. Her research interests include Artificial Intelligence, Data Science, Machine Learning, Cryptography and network security. She has over 20 years of research and work experience.

Dr. Ritu Yadav has received his Doctorate in the field of Metamaterial Patch Antenna. She graduated from NITTTR Chandigarh in India with a Master's in Electronics and Communication Engineering. She has been an assistant professor in the ECE department at The Technological Institute of Textile and Sciences in Bhiwani, Haryana, India, since 2006. She has a rich experience of20 years in Teaching and Industry. More than 30 of her research papers have been published in prestigious publications and conferences. Her areas of interest in research include Signal and System, Electromagnetic Waves, Network Analysis, etc.

Dr. Akhil Kaushik has completed his doctoral research in the field of DNA Cryptography from Amity University. He is a master’s degree holder from Central Queensland University, Melbourne, Australia in the field of IT. Currently employed at The Technological Institute of Textile and Sciences, Bhiwani, India as an Assistant Professor in the Computer Engineering Department, he has more than 19 years of industrial and teaching experience. His major research areas are Cryptography, Network Security and Data Science. He has over 20 research publications in International Journals of high repute and has presented his research in more than 37 International and National Conferences.

Dr. Anil Kumar has received his Doctoral Degree in the field of Wireless Sensor Networks recently. He has done the master’s degree in Computer Science and Engineering from the Guru Jambheshwar University of Science and Technology, Hisar, India. Currently he is working as an Assistant Professor in The Technological Institute of Textile and Sciences, Bhiwani, Haryana, India. He has published 12 papers in reputed International Journals. He has also presented 27 technical papers in various International Conferences and National Conferences. His research interests include Wireless Sensor Network, Artificial Neural Network and Network Security. He has got nearly 19 years of work experience in teaching and Industry.

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.