Network security: Difference between revisions
Mr. MacKenty (talk | contribs) (Created page with "right|frame|Networks<ref>http://www.flaticon.com/</ref> == Methods of network security == * encryption types * userID * trusted media access control (MA...") |
Mr. MacKenty (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
[[file:network.png|right|frame|Networks<ref>http://www.flaticon.com/</ref>]] | [[file:network.png|right|frame|Networks<ref>http://www.flaticon.com/</ref>]] | ||
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.<ref>https://en.wikipedia.org/wiki/Network_security</ref> | |||
== Methods of network security == | == Methods of network security == |
Revision as of 13:25, 15 November 2017
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.[2]
Methods of network security[edit]
- encryption types
- userID
- trusted media access control (MAC) addresses
Standards[edit]
These standards are used from the IB Computer Science Subject Guide[3]
- Describe the different methods of network security.
- Evaluate the advantages and disadvantages of each method of network security.
References[edit]
- ↑ http://www.flaticon.com/
- ↑ https://en.wikipedia.org/wiki/Network_security
- ↑ IB Diploma Programme Computer science guide (first examinations 2014). Cardiff, Wales, United Kingdom: International Baccalaureate Organization. January 2012.