Abstract
In the field of networking, the specialist area of Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together.
The terms Network Security and Information Security are often used interchangeably. Network Security is generally taken as providing protection at the boundaries of an organization by keeping out intruders (hackers). Information Security, however, explicitly focuses on protecting data resources from malware attack or simple mistakes by people within an organization by use of Data Loss Prevention (DLP) techniques. One of these techniques is to compartmentalize large networks with internal boundaries. Employees have to cross these boundaries and be authenticated when attempting to access protected information.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
- Control Transmission Protocol
- Internet Protocol
- Network Security
- Virtual Private Network
- Unauthorized Access
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Watkins, M., Wallace, K.: CCNA Security: Official Exam Certification Guide. Pearson Education, London
Lammle, T.: CCNA: Cisco Certified Network Study Guide. Sybex
Odom, W.: CCNA Exam Certification Guide. Cisco Press,
Lowe, D.: Networking: All-in-one Desk reference for Dummies. Wiley, Chichester
Stewart, B.D., Gough, C.: CCNP BSCI Official Exam Certification Guide. Cisco Press,
Hucaby, D.: CCNP BCMSN Official Exam Certification Guide. Cisco Press
Tanenbaum, A.S.: Computer Networks. Pearson Education, London
Morgan, B., Lovering, N.: CCNP ISCW Offical Exam Certification Guide. Cisco Press
Bastien, G., Degu, C.: CCSP Cisco Pix Firewall Advance Exam Certification Guide. Cisco Press
Hall, E.: Internet Core Protocols, The Definitive Guide. O’Reilly, Sebastopol
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sharma, A.K., Lamba, C.S. (2010). Network Security and Networking Protocols. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Networks and Communications. WeST VLSI NeCoM ASUC WiMoN 2010 2010 2010 2010 2010. Communications in Computer and Information Science, vol 90. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14493-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-14493-6_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14492-9
Online ISBN: 978-3-642-14493-6
eBook Packages: Computer ScienceComputer Science (R0)