SlideShare a Scribd company logo
1 of 2
Download to read offline
What is Network security, or Securiing your data Through Network,
Network security consists of the policies and practices adopted to prevent and monitor
unauthorized access, misuse, modification, or denial of a computer network and network-
accessible resources. Network security involves the authorization of access to data in a network,
which is controlled by the network administrator.
Standards for Network Security are:-
The Network Security Standard provides measures to prevent, detect, and correct network
compromises. The standard is based on both new practices and best practices currently in use at
RIT.
The Cyber Security Technical team at World Level Decides the Standards necessary for the
Network to be secured.
Regulations:-
Cybersecurity regulation comprises directives from the Executive Branch and legislation from
Congress that safeguards information technology and computer systems. The purpose of
cybersecurity regulation is to force companies and organizations to protect their systems and
information from cyber-attacks. Cyber-attacks include viruses, worms, Trojan horses, phishing,
denial of service (DOS) attacks, unauthorized access (stealing intellectual property or
confidential information) and control system attacks.
Network Compilations:-
The term network compliance is a broad one, and can have many meanings. The word
compliance means “the state or act or conforming with or agreeing to do something, often in
response to legislation, rules or regulations or court order.” Complying with all the rules, laws
and orders in effect in the U.S. and other jurisdictions can be a tall order. Within the industry, the
term is usually used to refer to one of the following:
Laws:-
There are many laws in the field of Cyber Security or we can say Network Security, and are
increasing day by day, some of them are,
Difference Between Laws and Regulations:-
Laws are the products of written statutes, passed by either the U.S. Congress or state legislatures.
The legislatures create bills that, when passed by a vote, become law.
Regulations, on the other hand, are standards and rules adopted by administrative agencies that
govern how laws will be enforced. So an agency like the SEC can have its own regulations for
enforcing major securities laws.
Thank You
Solution
What is Network security, or Securiing your data Through Network,
Network security consists of the policies and practices adopted to prevent and monitor
unauthorized access, misuse, modification, or denial of a computer network and network-
accessible resources. Network security involves the authorization of access to data in a network,
which is controlled by the network administrator.
Standards for Network Security are:-
The Network Security Standard provides measures to prevent, detect, and correct network
compromises. The standard is based on both new practices and best practices currently in use at
RIT.
The Cyber Security Technical team at World Level Decides the Standards necessary for the
Network to be secured.
Regulations:-
Cybersecurity regulation comprises directives from the Executive Branch and legislation from
Congress that safeguards information technology and computer systems. The purpose of
cybersecurity regulation is to force companies and organizations to protect their systems and
information from cyber-attacks. Cyber-attacks include viruses, worms, Trojan horses, phishing,
denial of service (DOS) attacks, unauthorized access (stealing intellectual property or
confidential information) and control system attacks.
Network Compilations:-
The term network compliance is a broad one, and can have many meanings. The word
compliance means “the state or act or conforming with or agreeing to do something, often in
response to legislation, rules or regulations or court order.” Complying with all the rules, laws
and orders in effect in the U.S. and other jurisdictions can be a tall order. Within the industry, the
term is usually used to refer to one of the following:
Laws:-
There are many laws in the field of Cyber Security or we can say Network Security, and are
increasing day by day, some of them are,
Difference Between Laws and Regulations:-
Laws are the products of written statutes, passed by either the U.S. Congress or state legislatures.
The legislatures create bills that, when passed by a vote, become law.
Regulations, on the other hand, are standards and rules adopted by administrative agencies that
govern how laws will be enforced. So an agency like the SEC can have its own regulations for
enforcing major securities laws.
Thank You

More Related Content

Similar to What is Network security, or Securiing your data Through Network,N.pdf

Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
padler01
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
Tam Nguyen
 

Similar to What is Network security, or Securiing your data Through Network,N.pdf (20)

Lecture 8.pdf
Lecture 8.pdfLecture 8.pdf
Lecture 8.pdf
 
Cyber security
 Cyber security Cyber security
Cyber security
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Data Risks In A Digital Age
Data Risks In A Digital Age Data Risks In A Digital Age
Data Risks In A Digital Age
 
Fundamentals of Information Security..pdf
Fundamentals of Information Security..pdfFundamentals of Information Security..pdf
Fundamentals of Information Security..pdf
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:Module 3.Infrastructure and Network Security:
Module 3.Infrastructure and Network Security:
 
Module 3.pdf
Module 3.pdfModule 3.pdf
Module 3.pdf
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 

More from anujmkt

While doing capital investment, CFO analyze all the risk related to .pdf
While doing capital investment, CFO analyze all the risk related to .pdfWhile doing capital investment, CFO analyze all the risk related to .pdf
While doing capital investment, CFO analyze all the risk related to .pdf
anujmkt
 
The scanner performs lexical analysis of a precise program (in our c.pdf
The scanner performs lexical analysis of a precise program (in our c.pdfThe scanner performs lexical analysis of a precise program (in our c.pdf
The scanner performs lexical analysis of a precise program (in our c.pdf
anujmkt
 
solimportance for an organization to implement an enterprise system.pdf
solimportance for an organization to implement an enterprise system.pdfsolimportance for an organization to implement an enterprise system.pdf
solimportance for an organization to implement an enterprise system.pdf
anujmkt
 
We use the complementation principle. Clearly the.pdf
                     We use the complementation principle. Clearly the.pdf                     We use the complementation principle. Clearly the.pdf
We use the complementation principle. Clearly the.pdf
anujmkt
 
Please follow the data and description EBNF In the stream of c.pdf
Please follow the data and description EBNF In the stream of c.pdfPlease follow the data and description EBNF In the stream of c.pdf
Please follow the data and description EBNF In the stream of c.pdf
anujmkt
 

More from anujmkt (20)

It is used as the solvent .pdf
                     It is used as the solvent                        .pdf                     It is used as the solvent                        .pdf
It is used as the solvent .pdf
 
molality = mole wt of solvent 0.11 = mole 21.pdf
                     molality = mole  wt of solvent  0.11 = mole  21.pdf                     molality = mole  wt of solvent  0.11 = mole  21.pdf
molality = mole wt of solvent 0.11 = mole 21.pdf
 
NaF would be having highest melting point because.pdf
                     NaF would be having highest melting point because.pdf                     NaF would be having highest melting point because.pdf
NaF would be having highest melting point because.pdf
 
The four bases in DNA are Adenine, Guanine, Cytos.pdf
                     The four bases in DNA are Adenine, Guanine, Cytos.pdf                     The four bases in DNA are Adenine, Guanine, Cytos.pdf
The four bases in DNA are Adenine, Guanine, Cytos.pdf
 
b) HNO2,NO2^+ as when H+ will leave then NO2- wil.pdf
                     b) HNO2,NO2^+ as when H+ will leave then NO2- wil.pdf                     b) HNO2,NO2^+ as when H+ will leave then NO2- wil.pdf
b) HNO2,NO2^+ as when H+ will leave then NO2- wil.pdf
 
CO3 Sol.pdf
                     CO3                                       Sol.pdf                     CO3                                       Sol.pdf
CO3 Sol.pdf
 
Number of moles of Calcium = 0.05Number of equivalents of calcium .pdf
Number of moles of Calcium = 0.05Number of equivalents of calcium .pdfNumber of moles of Calcium = 0.05Number of equivalents of calcium .pdf
Number of moles of Calcium = 0.05Number of equivalents of calcium .pdf
 
A) d B) a, b, c Solution .pdf
                     A) d B) a, b, c  Solution                    .pdf                     A) d B) a, b, c  Solution                    .pdf
A) d B) a, b, c Solution .pdf
 
While doing capital investment, CFO analyze all the risk related to .pdf
While doing capital investment, CFO analyze all the risk related to .pdfWhile doing capital investment, CFO analyze all the risk related to .pdf
While doing capital investment, CFO analyze all the risk related to .pdf
 
TrueClay it the important of soil for holding plant nutrients in t.pdf
TrueClay it the important of soil for holding plant nutrients in t.pdfTrueClay it the important of soil for holding plant nutrients in t.pdf
TrueClay it the important of soil for holding plant nutrients in t.pdf
 
The statement is FalseOnly single target target agents are sunject.pdf
The statement is FalseOnly single target target agents are sunject.pdfThe statement is FalseOnly single target target agents are sunject.pdf
The statement is FalseOnly single target target agents are sunject.pdf
 
The reactants along with the oxidation states are Zn = 0 CuSO4.pdf
The reactants along with the oxidation states are Zn = 0 CuSO4.pdfThe reactants along with the oxidation states are Zn = 0 CuSO4.pdf
The reactants along with the oxidation states are Zn = 0 CuSO4.pdf
 
The scanner performs lexical analysis of a precise program (in our c.pdf
The scanner performs lexical analysis of a precise program (in our c.pdfThe scanner performs lexical analysis of a precise program (in our c.pdf
The scanner performs lexical analysis of a precise program (in our c.pdf
 
Solution Pseudoextinction refers to- D) a species evolving to t.pdf
Solution Pseudoextinction refers to- D) a species evolving to t.pdfSolution Pseudoextinction refers to- D) a species evolving to t.pdf
Solution Pseudoextinction refers to- D) a species evolving to t.pdf
 
Share Holders Equity = Current Assets + Net Fixed Assets - Current.pdf
Share Holders Equity = Current Assets + Net Fixed Assets - Current.pdfShare Holders Equity = Current Assets + Net Fixed Assets - Current.pdf
Share Holders Equity = Current Assets + Net Fixed Assets - Current.pdf
 
The correct answer for m_1=2 is 2,3 for lSolutionThe corre.pdf
The correct answer for m_1=2 is 2,3 for lSolutionThe corre.pdfThe correct answer for m_1=2 is 2,3 for lSolutionThe corre.pdf
The correct answer for m_1=2 is 2,3 for lSolutionThe corre.pdf
 
solimportance for an organization to implement an enterprise system.pdf
solimportance for an organization to implement an enterprise system.pdfsolimportance for an organization to implement an enterprise system.pdf
solimportance for an organization to implement an enterprise system.pdf
 
We use the complementation principle. Clearly the.pdf
                     We use the complementation principle. Clearly the.pdf                     We use the complementation principle. Clearly the.pdf
We use the complementation principle. Clearly the.pdf
 
right idea but numbers are wrong all over the placeSolution.pdf
right idea but numbers are wrong all over the placeSolution.pdfright idea but numbers are wrong all over the placeSolution.pdf
right idea but numbers are wrong all over the placeSolution.pdf
 
Please follow the data and description EBNF In the stream of c.pdf
Please follow the data and description EBNF In the stream of c.pdfPlease follow the data and description EBNF In the stream of c.pdf
Please follow the data and description EBNF In the stream of c.pdf
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
cupulin
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdfRich Dad Poor Dad ( PDFDrive.com )--.pdf
Rich Dad Poor Dad ( PDFDrive.com )--.pdf
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdfContoh Aksi Nyata Refleksi Diri ( NUR ).pdf
Contoh Aksi Nyata Refleksi Diri ( NUR ).pdf
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 

What is Network security, or Securiing your data Through Network,N.pdf

  • 1. What is Network security, or Securiing your data Through Network, Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network- accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Standards for Network Security are:- The Network Security Standard provides measures to prevent, detect, and correct network compromises. The standard is based on both new practices and best practices currently in use at RIT. The Cyber Security Technical team at World Level Decides the Standards necessary for the Network to be secured. Regulations:- Cybersecurity regulation comprises directives from the Executive Branch and legislation from Congress that safeguards information technology and computer systems. The purpose of cybersecurity regulation is to force companies and organizations to protect their systems and information from cyber-attacks. Cyber-attacks include viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks. Network Compilations:- The term network compliance is a broad one, and can have many meanings. The word compliance means “the state or act or conforming with or agreeing to do something, often in response to legislation, rules or regulations or court order.” Complying with all the rules, laws and orders in effect in the U.S. and other jurisdictions can be a tall order. Within the industry, the term is usually used to refer to one of the following: Laws:- There are many laws in the field of Cyber Security or we can say Network Security, and are increasing day by day, some of them are, Difference Between Laws and Regulations:- Laws are the products of written statutes, passed by either the U.S. Congress or state legislatures. The legislatures create bills that, when passed by a vote, become law. Regulations, on the other hand, are standards and rules adopted by administrative agencies that govern how laws will be enforced. So an agency like the SEC can have its own regulations for enforcing major securities laws. Thank You
  • 2. Solution What is Network security, or Securiing your data Through Network, Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network- accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Standards for Network Security are:- The Network Security Standard provides measures to prevent, detect, and correct network compromises. The standard is based on both new practices and best practices currently in use at RIT. The Cyber Security Technical team at World Level Decides the Standards necessary for the Network to be secured. Regulations:- Cybersecurity regulation comprises directives from the Executive Branch and legislation from Congress that safeguards information technology and computer systems. The purpose of cybersecurity regulation is to force companies and organizations to protect their systems and information from cyber-attacks. Cyber-attacks include viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks. Network Compilations:- The term network compliance is a broad one, and can have many meanings. The word compliance means “the state or act or conforming with or agreeing to do something, often in response to legislation, rules or regulations or court order.” Complying with all the rules, laws and orders in effect in the U.S. and other jurisdictions can be a tall order. Within the industry, the term is usually used to refer to one of the following: Laws:- There are many laws in the field of Cyber Security or we can say Network Security, and are increasing day by day, some of them are, Difference Between Laws and Regulations:- Laws are the products of written statutes, passed by either the U.S. Congress or state legislatures. The legislatures create bills that, when passed by a vote, become law. Regulations, on the other hand, are standards and rules adopted by administrative agencies that govern how laws will be enforced. So an agency like the SEC can have its own regulations for enforcing major securities laws. Thank You