2. Chapter goals
1. What is a network?
2. Why do we need network security?
3. What is vulnerability?
4. Firewall as network security
5. Conclusion
3. What is a network?
A network is a series of nodes interconnected to each other
by communication paths. Each computer is a network
which is connected to other network using wired
connection or a wireless connection such as Wi-Fi.
The best example for a network is internet. A router
network is required to connect internet with one or many
computer networks together.
4. Network security and its uses
Network security is a set of policies which blocks
vulnerabilities such as unauthorized access to the
computer networks.
It is mainly developed to avoid thefts, misuse of
computer, etc. If one network is affected, there are
wide chances to affects the other networks which are
interconnected.
5. Network security and its uses
When network security software such as firewall is
installed in a computer network, the connections that it
receives are well scanned by the firewall software and
accepts the connection only if it is found safe. The rest
of the connections which are unsafe are denied to enter
the network.
By this method our computer, and devices that are
connected to computer can be kept safe and the data
can be protected.
6. What is vulnerability?
Vulnerability in computer network is a weakness in
security that are exposed to attacks by hackers or
intruders. A risk in computer network can be named
as a vulnerability.
7. Firewall as network security
Firewall is a network security software which acts as a
protecting barrier against threats from attackers to
exploit the computer network.
Computers can be attacked using external devices such as
pendrive, hard-disk, CDs, etc. Through which malware
is sent to the system and the hackers takes full control
over the system and destroys the computer.
8. Firewall as network security
Another way is through wireless connection such as
internet. Internet is a network that connects
thousands and thousands of network together. Now a
days, malicious software are passed by sending email
spam, by visiting untrusted domains, downloading
malicious files, etc.
A firewall is used to block the unauthorized access to the
system. The network that a computer receives to
connect is well scanned by the firewall present in the
computer, the data is sent to the computer only if the
data obeys the following rules programmed in the
firewall software.
9. Conclusion
With an increase in online attacks, it is mandatory to
have security software such as firewall installed to
secure and protect the network from hackers.
10. Conclusion
With an increase in online attacks, it is mandatory to
have security software such as firewall installed to
secure and protect the network from hackers.