<br />
<b>Warning</b>:  Undefined array key "global_protection_id" in <b>/home/wikitechy/public_html/interview-questions/wp-content/plugins/content-protector/inc/class-ps-rest-handler.php</b> on line <b>51</b><br />
{"id":4615,"date":"2022-08-09T11:36:23","date_gmt":"2022-08-09T11:36:23","guid":{"rendered":"https:\/\/www.wikitechy.com\/interview-questions\/?p=4615"},"modified":"2022-08-09T11:36:23","modified_gmt":"2022-08-09T11:36:23","slug":"what-is-network-security","status":"publish","type":"post","link":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/","title":{"rendered":"What is Network Security ?"},"content":{"rendered":"<ul>\n<li>It is the security provided to a network from unauthorized access and risks.<\/li>\n<li>The duty of network administrators is to adopt preventive measures to protect their networks from potential security threats.<\/li>\n<li>Computer networks are involved in regular communication and transactions within the individuals, government, or business require security.<\/li>\n<li>The simple way of protecting a network resource is by assigning it a unique name and a corresponding password.<\/li>\n<li>There are three types of network security, they are:\n<ul>\n<li>Access Control<\/li>\n<li>Antivirus and Anti-malware Software<\/li>\n<li>Cloud Security<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-4616 aligncenter\" src=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security.png\" alt=\"\" width=\"1243\" height=\"825\" srcset=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security.png 1243w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security-300x199.png 300w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security-1024x680.png 1024w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security-768x510.png 768w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security-390x259.png 390w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security-820x544.png 820w, https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security-1180x783.png 1180w\" sizes=\"(max-width: 1243px) 100vw, 1243px\" \/><\/p>\n<h2 id=\"access-control\">Access Control<\/h2>\n<ul>\n<li>Not every person having complete allowance to accessibility the network or its data.<\/li>\n<li>Network Access Control ensures that only a handful of authorized personnel must be able to work with allowed number of resources.<\/li>\n<\/ul>\n<h2 id=\"antivirus-and-anti-malware-software\">Antivirus and Anti-malware Software<\/h2>\n<ul>\n<li>Antivirus is the network security that ensures any malicious software does not enter the network and jeopardize the security of the data.<\/li>\n<li>Malicious software like Trojans, Worms, Viruses are handled by the same.<\/li>\n<li>This ensure that not only the entry of the malware is protected but also that the system is well equipped to fight once it has entered.<\/li>\n<\/ul>\n<h2 id=\"cloud-security\">Cloud Security<\/h2>\n<ul>\n<li>Using internet many organizations are joining hands wuth the cloud security technology where a large amount of important data is stored.<\/li>\n<li>Cloud Security is very vulnerable to the mal practices that few unauthorized dealers might pertain.<\/li>\n<li>Many businesses embrace using Software as a Service (SaaS) application for providing some of its employees the allowance of accessing the data stored over the cloud.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is the security provided to a network from unauthorized access and risks. The duty of network administrators is to adopt preventive measures to protect their networks from potential security threats. Computer networks are involved in regular communication and transactions within the individuals, government, or business require security. The simple way of protecting a network [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"passster_activate_protection":false,"passster_protect_child_pages":"","passster_protection_type":"password","passster_password":"","passster_activate_overwrite_defaults":"","passster_headline":"","passster_instruction":"","passster_placeholder":"","passster_button":"","passster_id":"","passster_activate_misc_settings":"","passster_redirect_url":"","passster_hide":"no","passster_area_shortcode":"","gtb_hide_title":false,"gtb_wrap_title":false,"gtb_class_title":"","gtb_remove_headerfooter":false,"footnotes":""},"categories":[4590],"tags":[17877,4991,17876,17878,17871,17875,17874,17885,17884,17883,17872,17879,17880,17887,17882,17881,17889,17886,17888,17873],"class_list":["post-4615","post","type-post","status-publish","format-standard","hentry","category-networking","tag-examples-of-network-security","tag-network-security","tag-network-security-notes","tag-types-of-network-security","tag-what-is-network-security","tag-what-is-network-security-and-why-is-network-security-necessary","tag-what-is-network-security-architecture","tag-what-is-network-security-group","tag-what-is-network-security-group-in-azure","tag-what-is-network-security-in-computer-network","tag-what-is-network-security-in-cryptography","tag-what-is-network-security-key","tag-what-is-network-security-key-for-hotspot","tag-what-is-network-security-key-for-hp-printer","tag-what-is-network-security-key-in-laptop","tag-what-is-network-security-key-on-router","tag-what-is-network-security-policy","tag-what-is-network-security-threats","tag-whats-is-network-security-key","tag-why-is-network-security-important"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Network Security ? - Types of Network Security - Wikitechy<\/title>\n<meta name=\"description\" content=\"What is Network Security ? - It is the security provided to a network from unauthorized access and risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Network Security ? - Types of Network Security - Wikitechy\" \/>\n<meta property=\"og:description\" content=\"What is Network Security ? - It is the security provided to a network from unauthorized access and risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Wikitechy\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-09T11:36:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security.png\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/\",\"name\":\"What is Network Security ? - Types of Network Security - Wikitechy\",\"isPartOf\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security.png\",\"datePublished\":\"2022-08-09T11:36:23+00:00\",\"dateModified\":\"2022-08-09T11:36:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/f785ba3ecc599133e65ab6138042a3e4\"},\"description\":\"What is Network Security ? - It is the security provided to a network from unauthorized access and risks.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/#primaryimage\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security.png\",\"contentUrl\":\"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security.png\",\"width\":1243,\"height\":825},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#website\",\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/\",\"name\":\"Wikitechy\",\"description\":\"Interview Questions\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/f785ba3ecc599133e65ab6138042a3e4\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/155b77fd8cdda3d0913fcb7e7ee63543b0c345d2d8f6dcebda5b0583ab61f967?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/155b77fd8cdda3d0913fcb7e7ee63543b0c345d2d8f6dcebda5b0583ab61f967?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/www.wikitechy.com\/interview-questions\"],\"url\":\"https:\/\/www.wikitechy.com\/interview-questions\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Network Security ? - Types of Network Security - Wikitechy","description":"What is Network Security ? - It is the security provided to a network from unauthorized access and risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/","og_locale":"en_US","og_type":"article","og_title":"What is Network Security ? - Types of Network Security - Wikitechy","og_description":"What is Network Security ? - It is the security provided to a network from unauthorized access and risks.","og_url":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/","og_site_name":"Wikitechy","article_published_time":"2022-08-09T11:36:23+00:00","og_image":[{"url":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security.png"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/","url":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/","name":"What is Network Security ? - Types of Network Security - Wikitechy","isPartOf":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/#primaryimage"},"image":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security.png","datePublished":"2022-08-09T11:36:23+00:00","dateModified":"2022-08-09T11:36:23+00:00","author":{"@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/f785ba3ecc599133e65ab6138042a3e4"},"description":"What is Network Security ? - It is the security provided to a network from unauthorized access and risks.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/networking\/what-is-network-security\/#primaryimage","url":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security.png","contentUrl":"https:\/\/www.wikitechy.com\/interview-questions\/wp-content\/uploads\/2022\/08\/network-security.png","width":1243,"height":825},{"@type":"WebSite","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#website","url":"https:\/\/www.wikitechy.com\/interview-questions\/","name":"Wikitechy","description":"Interview Questions","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wikitechy.com\/interview-questions\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/f785ba3ecc599133e65ab6138042a3e4","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.wikitechy.com\/interview-questions\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/155b77fd8cdda3d0913fcb7e7ee63543b0c345d2d8f6dcebda5b0583ab61f967?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/155b77fd8cdda3d0913fcb7e7ee63543b0c345d2d8f6dcebda5b0583ab61f967?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/www.wikitechy.com\/interview-questions"],"url":"https:\/\/www.wikitechy.com\/interview-questions\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/4615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/comments?post=4615"}],"version-history":[{"count":1,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/4615\/revisions"}],"predecessor-version":[{"id":4617,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/posts\/4615\/revisions\/4617"}],"wp:attachment":[{"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/media?parent=4615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/categories?post=4615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechy.com\/interview-questions\/wp-json\/wp\/v2\/tags?post=4615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}