Saturday, January 4, 2020

What is Network Security and Data Security? Complete knowledge of network and data security

Hello friends, what are Network Security and Data Security? What is the difference between Cyber Security and Network Security? Today we will learn about network security in this post. The world's largest networks are the Internet, and nowadays the Internet is being used in many areas in many pairs. In such a situation, security of the network becomes much more important. So let's learn about network and data security.

Network And Data Security
What are network security? 

If we understand both network and security terms separately, the network means a group of two or more computers (Nodes) that are interconnected, and communicate with each other. And security means security. That is, avoiding the Access of Unknown Users to a network is called network security. 

Network Security is a process by which a network is protected from unauthorised User Access (without permission) such as:- Phishing, Hacking, Trojan Horse, Spyware, Worm, Malware, Etc. To increase network security in a network, we must monitor the network, use software and hardware components. like - Firewall, Antivirus, Etc. 

In a network, protecting all information and data sent through devices is called Network Security. It is a subject of cyber security which aims to protect data in the network. To ensure that information or data is not changed or interrupted. 

What are data security? 

The process of protecting all data on a device or computer from access to an Unauthorised User is called Data Security. The process of protecting data from unauthorised data usage and data corruption around the world is called data security. 
Keeping data away from the reach of unauthorised persons so that data cannot be misrepresented or deleted. Authorization check is done before providing access to data to the user.  

What are cyber security?

Cyber security is the process of protecting all computers, networks, programs, data, and information from unauthorised User Access. Cyber security is also known as Information Technology Security or Electronic Information Security. It is a kind of security that is meant for all computers connected to the network. It carries out the task of protecting computers, hardware, software, information and data from cyber crime. 

Cyber security works to protect computer systems, networks, programs, information of data from Digital Attacks. 

Cyber Space 

The storage of computer communication networks spread around the world and its spread information is given the fictional name of cyberspace. The term cyberspace was first used by William Gibson, author of Imagination Science, in his book Necromancer in 1984. Currently the term cyberspace is used for the Internet and the World Wide Web (www), but it is not correct.

Cyber Warfare 

Stealing secret and sensitive data, destroying or damaging data or disrupting network communication is called cyber warfare by a national entering the computer network on the other way. The growing importance of the Internet has made cyber warfare an important part of the war strategy. That is why it is also known as the Fifth Domain of Warfare after air, sea, land, and space.

Cyber Crime 

Any illegal act or offence committed through computers and the Internet is called cyber crime. The computer and the Internet are used in a tool, target or both form. The crime committed through the Internet is also called Net Crime. Cyber crime involves damaging computers, networks or data or using computers, networks or data in any other crime. 

Obtaining or misusing someone's personal information, removing or stealing someone's personal information from a computer is called a cyber crime. Cyber crime is also called computer crime. Meeting a computer in a criminal place or committing an offence from a computer is called a computer offence. 

Computer offenders are made of many types such as stealing information from the computer, erasing information, altering information, giving or destroying someone's information to another, etc. Similarly, cyber crimes are also of many types such as spam emails, hacking, phishing, virus insertion, receiving or stealing someone's information online, networking or keeping an eye on someone through the Internet at all times, etc.

Example of Cyber Crime

● To use the network officially. 
● To obtain personal and secret information using networks and computers. 
● Damage to network and information. 
● Sending a large number of emails (e-mail bombing). 
● Damag to computers and data by viruses. 
● Committing Financial Fraud using the Internet.

Measures to avoid Cyber Crime 

● Always protect login ID and Password. And it should be changed from time to time. 
● You should use Antivirus Software. 
Using Firewall. 
● Keep ingress of data backup copies. 
Using Proxy Server. 
● To convert data into encrypted form and receive it. 

Computer Security 

Computer security refers to the protection of data stored in the computer and transferred by the network. In simple terms, the computer I stored is called Computer Security, protecting all information and data transferred from the network. Its functions are to prevent authorised use of data, protect user identity and personal information, etc.

Computer security is also known as Cyber Security or IT Security. Computer security aims to protect and protect information and Data from theft, corruption or natural disaster, keeping information and data easy and simple for its Authorised User. Attack ing in computer security can carry out the following tasks: 

● Authorised use of data can be done. 
● User identity and personal information such as passwords, etc., can be obtained. 
● Unnecessary changes can be made to the data. 
● Data can be destroyed. 
● Who can prevent the implementation of the software program. 


Messages sent to many people using computers and the Internet in an unwanted and illegal way are called Spam. This is known as misuse of the network. This is the undifferentiated distribution of email messages that is possible due to overlapping of subscriptions in the email mechanism. Spam does not normally cause any harm to computers, networks and data. In fact spam is a small program sent to the Internet in large numbers so that it can be displayed repeatedly on the Internet user's site. 
Spam is primarily advertising that people don't usually want to see. Therefore, the user's attention is drawn by sending it again and again. Sending spam costs to the user (Client) or service provider, so it is used as a cheap medium of advertising. Spammers are difficult to catch because of the vastness of the Internet. This can be avoided using spam filter or antispam software. 


When we use a website with the help of web browser, the server of that website sends a brief data file to the user's browser. Cookies are the software by which many websites store certain notifications on the user's computer. Cookies work behind the scenes, without user information. This keeps the server stored on the web browser the details of the user's preferences and the websites searched by it.

If the same user goes back to the same website, the server presents its preferences and website through cookies. Some websites remember the user's Username and Password, which does not require repeated logins. Thus, cookies make internet usage easier. Cookies do not normally cause any harm. But they are used to send advertisements to the website as per the user's interest.
In addition, some cookies eliminate privacy by placing details of the user's personal information and websites they visit. We may turn cookies on (Enable) or off when using web browser software.

Proxy Server

It is a server connected to the local network that checks the request for computers connected to the Internet as per the prescribed rules and sends it to the server only if found correct as per rules. Thus, it acts as a filter between the main server and the user and protects the network from unauthorized users. Proxy servers can be hardware or software or both. 

Objectives of Proxy Server 

● Unwanted Web Browser or Website restricted. 
● Control malware and viruses. 
● Maintaining the privacy of the main server
● Increase the speed of data transfer
● Protect classified data (Classified Information & Data), etc.
This is a device that prevents unauthorised persons (Unauthorised Person) from entering a computer's network, while authorised users (Authorised Users) are allows computers, networks, and data to be used. Thus, the firewall protects a computer, data, or local network from unauthorised users. Firewalls can be in the form of hardware, software or both. It serves as a gate between normal networks and secure networks and protects the computer from network threats such as viruses, worms, hacks, etc.

The firewall protects a local network or local area network (LAN) from internet security flaws. It checks incoming data, allows the authorised user to use the network through the user name and password. In addition, firewalls maintain lan's privacy on the Internet. 

Computer Virus 

It is a small malicious software program that connects with a legitimate program or enters the computer's memory by the Internet and helps spread its own copy. It can act as a corrupt, or altered data. It can reduce the disk capacity and slow down the speed of the computer by entering the boot sector of the hard disk or prevent the software program from running. 
The virus associated with a program is not activated until the program is run. The virus does not spread by email message. The virus on e-mail is activated when the email attachment is opened. When the virus is active, it installs itself in the computer memory and starts spreading to the empty space of memory. Some viruses connect themselves to the boot sector of the computer. The computer does a lot of won, the more the virus spreads. Many viruses have the ability to damage the program even after a long time.

Computer viruses mainly enter from one computer to another with internet (email, games, downloading files, etc.) or memory tools such as CD, DVD Floppy Disk, Pen Drive, Hard Disk, Etc. The virus with it can affect the computer when you download the file on the Internet. Viruses are a software program, so it does not affect computer hardware. The virus enters memory and installs itself so it cannot affect Write Protect Memory or Compressed Data File. 

Effect of virus on computer 

Whether a computer is affected by viruses can be identified with the following symptoms: 

● The virus slows down the speed of the computer's working speed. 
● The computer starts to hang again and again. 
● The computer does not indicate the exact position and size of the memory. 
● Some programs are not able to run on the computer. 
● Some files in computer memory are affected and their data becomes corrupt. 

Antivirus Software

Antivirus software is used to avoid the dangers of various software viruses on computers and networks. It is a software program that identifies and destroys scholarly malicious programs such as viruses, malware, etc. in software and prevents them from entering a software or program. The Auto Protect program of antivirus software checks any software, email, Internet files before use and also destroys viruses if detected
Antivirus software checks computer memory by periodically scanning the system to free the computer from viruses. It also notifies you by notification immediately when a virus is activated. As new viruses come to light, companies also issue antivirus programs for the same. Therefore, it is important that antivirus software be updated from time to time. 

Internet Security 

Internet security means keeping information, data or software available on networks and networks out of the reach of unauthorized persons and ensuring their use only by trusted users. It covers the security of most browsers, but the security of the network is most common, which also applies to other applications, software or operating systems. 
Internet security is to thwart attacks by the Internet and protect the device. There is a non-secure way of exchanging information in the Internet that threatens a variety of deceptions, online viruses, Trojan horses, etc., which protect Internet security. Internet Security is a branch of computer security that protects not only internet security but also Browser Security, Network Security. Internet Security has three base: 

i) Authentication 

Authentication is a method of Computer Access Control in which a user is given access only if it successfully presents all the proofs such as Login ID, Password, Username, Etc. Internet Resources, such as e-mail, website, etc. Can be protected using authentication. User's authenticity is checked by login ID, password, etc !.!.!.  

ii) Access Control

Certain data ensure availability of this information only for certain users is called access control. Access control is a process in which the accessing user's data is registered. So that unauthorised users are kept out of reach and can be easily accessed by the authorised user. It can contain data a card, finger print, voice recognition, electronic card, and PIN. 

iii) Cryptography 

Converting information or data to a secret code before sending it to the Internet and converting it to general notice again before the recipient uses it is called cryptography. Cryptography consists of two processes of encryption and decryption. 
This is an important basis for data security on the Internet. The process of converting information or data into a secret message is called Encryption. While encrypted data, it is called Decryption to convert this information back into general information. Data transfer from cryptography is unlikely to be stolen or leaked.


● Huawei Mate X2 with dual displays likely to be launched in 2020

● World's smallest PC launch, price starts at ₹ 6,600

I hope you liked this post. And I have understood all the steps you have mentioned. If you have any question or suggestion, you can ask us by commenting. Apart from this, follow the Technology Gyan so that you keep getting information about all our new posts continuously.

To give your valuable time and read the post
                   Thanks You😊😊😊😊

No comments:
Write Comments

Please do not put any kind of Links in the Comments.

© 2014 Technology Gyan. Designed by bloggerthem9 | Distributed By Gooyaabi Templates
Powered by Blogger.