Security monitoring allows: 1. Effective security protection on the network 2. Controlling of various malicious activities on the network 3. Detailed understanding of security infrastructure of the network On the other hand, there are some drawbacks related to security monitoring, such as: 1. Organizations must ensure to implement a genuine and licensed security monitoring tool to perform complete security monitoring with all the features embedded, if not there are high risks of security attacks on the network.
An effective technique is to utilize software like spyware. A spyware is a utility which, once stored on a computer system, keeps a check on the online activities of the users of that computer, it captures the information such as password or e-mails, and then dispatches the collected information to the investigator. In case of wiretapping the encrypted data is captured, which is very tedious to decrypt. In case of spyware the data prior encryption is captured by the investigators. The main hurdle is to install the spyware prior the data seizing starts.
Thereby we focus on the current measures that users take to protect their data against such hazards or threats. Security behavior includes factors such as device securement, password generation, proactive awareness, updating behavior, as well as restrictions users make to their devices or
Information security is composed of computer security and communications security. Computer security includes the collection of tools to protect the data and prevent from hackers in a system. Network means the connection of computers, the security which can be included here is to protect the data during the transmissions. One type of attack in is computer virse 1.2
INTRODUCTION TO NETWORK SECURITY ABSTRACT Network security is protection of the files and directories in a computer network against hacking, misuse and unauthorized changes to the system. Network security involves the authorization of access to data in a network which is controlled by the network administrator. Users are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Today almost anyone can become a hacker by downloading tools from the internet. Nowadays security is becoming vital in case of networking because everyday a new kind of attack is generated which leads to compromise our network and have security in network is decreasing because
There are offline and online institutes that can offer great coaching in this field. The Forensic Security Certification develops a number of skills in the learner with the help of which one can track the computer and threats in an advanced manner and therefore it is very much required for the important organizations where there are highly confidential files and projects move on the network. The person has to work hard to be expert in this area of specialization which is considered as highly important task. There are a number of contents that one needs to understand thoroughly to command the program but thanks to the experts who have designed and created the program that makes it much simpler for the learners of this
1.1 Security Security is that the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable quality, appreciate someone, dwelling, community, nation, or organization. As noted by the Institute for Security and Open Methodologies ISECOM within the three, OSSTMM 3 security provides a kind of protection wherever a separation is made between the assets and also the threat. These separations area generically known as controls, and generally embrace changes to the quality or the threat 1.2 Security Services 1.2.1 Computer security Computer security additionally referred to as cyber security or IT security is security applied to computing devices such as computers and Smartphone’s, in addition as pc networks equivalent
Such as browser security and network security. Many applications that run on a personal computer through the use of its operating systems may want to access the Internet for add-ons or to send out information about the system this can be with or without the administrators consent. Thus Internet Security changes how and when applications are run altogether. Its a broad spectrum covering all transactions made over the Internet. It provides overall autentication and protection of ones information or data sent over the internet.
So some new technologies like CCE,WPA,AES etc were introduced to improve security of online networks. With the recent advancements in software and hardware fields it has become easier for the network administrators to prevent loss of their as well as users data from unauthorized access.
It covers both the Perimeter Protection (PP) and Access Control (AC). Perimeter protection is merely about the approach or technique used to prevent unwanted physical entries into the protected or restricted area . Access control is usually divided into two mechanisms of protections which are physical and logical. Physical approach is to control over unauthorized access or restrict any attempts to break in physically whereby logical approach is to control over both physical and online access