Monday, 12 October 2015

Different types of security used for a network

Various wireless security protocols were developed to protect home wireless networks. These wireless security protocols include WEP, WPA, and WPA2, each with their own strengths and weaknesses. In addition to stopping uninvited guests from connecting to your wireless network, wireless security protocols code your private data as it’s being transmitted over the airwaves.

Data Security
Data security refers to protective digital privacy measures that are used to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption.

Examples of Data security
software/hardware disk encryption backups
data masking  
data erasure.

Access security
Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment. There are two main types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access limits connections to computer networks, system files and data.

Examples of access security
There are two main types of access control:
Physical – like passwords
Logical – like access rights
The four main categories of access control are:
Mandatory access control
Discretionary access control
Role-based access control
Rule-based access control

Physical Security
Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause loss or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.

Examples of physical security
Physical measures:
Locks
Fences
Walls
Safes
Surveillance systems:
Heat sensors
Smoke detectors
Alarms
Cameras
Methods can be implemented to apprehend attackers and to recover quickly from accidents, fires, or natural disasters.

No comments:

Post a Comment