NETWORK SECURITY
Prensetd
by
Muhammad Fazeel
Network security
Table of Content
1.Define Network Security……………………………………..........................................3
2.History………………………………………………………………………………………………………..
3
3 .types………………………………………………………………………………………………………….
4
3.1 WAP……………………………………………………………………………………………………..4
3.2WEP……………………………………………………………………………………………………5
4.Advantages of Network security………………………………………………………………..5
5.Disadvantages of Network security……………………………………………………………6
Network security
Network security is a level of guarantee that all
the machines in a network are working
optimally and the users of these machines
only possess the rights that were granted to
them.
History
•Internet security has been issue since the
internet rose to an international phenomenon.
•By 1996 the internet already connected 13
million computers, so early security protocols
were required.
Types
¡Wi-Fi Protected Access (WPA)
¡WPA encrypts information, and checks to make sure
that the network security key has not been modified.
¡WPA also authenticates users to help ensure that
only authorized people can access the network.
¡WPA is designed to work with all wireless network
adapters, but it might not work with older routers
or access points.
Types ---------
¡Wired Equivalent Privacy (WEP)
WEP is an older network security method that is
still available to support older devices, but it is no
longer recommended
¡When you enable WEP, you set up a network security
key.
Advantages of network security
•Network Security helps in protecting personal
data of clients existing on network.
•Network Security facilitates protection of informatio
that is shared between computers on the network.
Disadvantages
¡Computer networks are typically a shared resource used by
many applications representing different interests.
•The Internet is particularly widely shared, being used by
competing businesses, mutually antagonistic governments,
and opportunistic criminals.
•Unless security measures are taken, a network conversation
or a distributed application may be compromised by an
adversary.