The protection of networks and their services from unauthorized modification, destruction, or disclosure to or by unauthorized third parties.
the implementation of procedures designed to limit access to resources to a predetermined set of staff and/or public computer users and prevent the tampering, unauthorized use, or destruction of computer data.
Measures taken to protect a communications pathway from unauthorized access to and accidental or willful interference of regular operations.
Refers to the measures taken to protect a set of computers from threats posed by hackers, viruses, thieves and other destructive forces. A secure network has the ability to protect the system of computers from these forces. See also Computer Security.
A system used to protect network resources from unauthorized access.
Managing the physical and logical accessibility of your network resources. Physical includes safeguarding the actual equipment; logical includes controlling customers' access to network resources.
The goal of keeping the computers and devices on a network secure. This may include any combination of hardware and software elements to protect these devices from diverse enemies, such as a cracker, Trojan Horse, or a virus. Network tools range from an Anti-virus application to a Firewall, or Intrusion Detection System.
Protection of networks and their services unauthorized modification, destruction, disclosure, and the provision of assurance that the network performs its critical functions correctly and there is no harmful side-effects.
Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.