Running head: NETWORK PROTECTION AGAINST THREATS 1 NETWORK PROTECTION AGAINST THREATS 4 Network Protection against Threats Threats, in the context of computer security, refers to any possible vulnerability to a computer system and has the potential to adversely affect the computer system and the stored data. Threats do not have to necessarily happen but in the event that they occur then there are huge losses to businesses and individuals, security is compromised and key data may be lost completely if no recovery methods had been put in place (Silberschatz et al., 2014). Cyber criminals are taking their malice to a new level every dawn and the rates at which they are accessing stored data in systems are a reason to get worried. The potential threats to the computer systems may be from viruses, back doors, Trojans and attacks from the system hackers. System developers have greatly being involved in devising mechanisms to address the issues related to network protection and some of the key solutions are authentication and identification, data encryption, and frequent system updates. Authentication and identification With this technique, the data can only be accessed by the required and the authorized personnel. Identification occurs when a unique name or an image is assigned to the users who interact with the information (White et al., 2017). Authentication is meant to ensure that the person who uses the data is verified as one of the authorized users. These techniques are used to allow or to deny access to data and can even involve authentication of the data and the hardware, and not just the user, through the use of passwords which are only shared with those that are intended to access the data. Data encryption Data encryption is a technique that has been used by system users and developers to ensure that data cannot be accessed by unauthorized persons. Data encryption translates the data into other codes or forms and a secret key is put in place. The persons who have information about the secret key are the only ones who can successfully use the data (Siowiorek & Swarz, 2017). The information, after being translated into codes and other forms cannot be read (ciphertext). The users then will use the secret key to unencrypt the data into readable and understandable forms (plaintexts). Data encryption is one of the most effective data and system protection methods used by organizations especially due to the fact that the data can only be read by those who have the key and even if fraudsters get access to the data, they cannot understand. Frequent system update There are new versions of the systems and the applications in use which are being developed occasionally. These new updates come with advanced features meant to increase the security of the systems (Bhargava & Reese, 2015). The responsibility is now vested on the system users to ensure that the systems in use are updated and have all the new features. Using outdated .