Due to the wide spread use of PCs and Developments in networks connecting PCs to company's Mainframe computers, there has been an increase in the chances of feeding undesirable data deliberately outsiders. A person with a PC at a remote place can use a phone line and illegally collect information without leaving any clues. Individual users can copy confidential data from a company's computer or other details from a remote station connected via a communication network.
Note:- The collection of tools designed to protect data and thwart hackers is known as computer security.
Security means preventing the network communication system fall in the hands of unauthorized people. The sender of data may wish to be assured that only the intended party actually receives designated data. The receiver must authenticate first that it is the one who is authorized to receive data and thereafter the sender exchanges data.
Hence, we need to take such steps so as to protect data during transmissions and guarantee that these transmissions are by authorized persons only. The network security methods adopted must address the following issues.
Note:- The collection of tools designed to protect data and thwart hackers is known as computer security.
Security means preventing the network communication system fall in the hands of unauthorized people. The sender of data may wish to be assured that only the intended party actually receives designated data. The receiver must authenticate first that it is the one who is authorized to receive data and thereafter the sender exchanges data.
Hence, we need to take such steps so as to protect data during transmissions and guarantee that these transmissions are by authorized persons only. The network security methods adopted must address the following issues.
- Information in a computer system should only be accessed by authorized persons.
- The shareable resources must be available only for use by authorized members.
- Unauthorized persons should not be able to insert spurious messages or records into a file being transmitted in a network.
- It should not be possible for an unauthorized party to perform wiretapping in order to capture data or illicitly copy files and programs.
No comments:
Post a Comment