Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Network Security

Handbook of Research on Advancing Cybersecurity for Digital Transformation
Is concerned with hardware, software, basic communication protocols, network frame structure, and communication mechanisms factors of the network. Information Security in the network context deals with data integrity, confidentiality, availability, and non-repudiation while is sent across the network.
Published in Chapter:
Cybersecurity and Electronic Services Oriented to E-Government in Europe
Teresa Magal-Royo (Universitat Politécnica de Valencia, Spain), José Macário de Siqueira Rocha (Leading Management Technology, Spain), Cristina Santandreu Mascarell (Universitat Politécnica de Valencia, Spain), Rebeca Diez Somavilla (Universitat Politécnica de Valencia, Spain), and Jose Luis Giménez López (Universitat Politécnica de Valencia, Spain)
DOI: 10.4018/978-1-7998-6975-7.ch016
Abstract
Cybersecurity in Europe as the rest of the world has been legislated for only 20 years. Numerous governmental institutions such as councils offer electronic services through their recently created electronic offices. In all of them, the volume of citizens who register temporarily or permanently to request online services related to the processing of documents and services with the government has increased significantly since the pandemic. Confinement has forced users to request numerous online services where authentication is one of the most relevant aspects to access safely and securely. European Union through the Connecting Europe Mechanism, CEF projects of the European Health Executive Agency, and Digital HaDEA has allowed numerous institutions to connect through the eIDAS created to establish trust in electronic transactions between individuals, organizations, and government entities across European member states.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Exploratory Research of Cyber Security Dimensions: Selected Use Cases Analysis
It refers to the tools and techniques used to protect the interconnected devices forming part of the information and communication system.
Full Text Chapter Download: US $37.50 Add to Cart
Recent and Emerging Technologies in Industrial IoT
Network security is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer.
Full Text Chapter Download: US $37.50 Add to Cart
Managing Compliance with an Information Security Management Standard
Provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network. It is involves the authorization of access to data in network, which is controlled by the administrator.
Full Text Chapter Download: US $37.50 Add to Cart
A Comparative Study of Attacks, Security Mechanisms, Preventive Measures, and Challenges in Wireless Sensor Networks
Network security is an over-arching term that describes that the policies and procedures implemented by a network administrator to avoid and keep track of unauthorized access, exploitation, modification, or denial of the network and network resources.
Full Text Chapter Download: US $37.50 Add to Cart
Security Challenges for Cloud Computing Development Framework in Saudi Arabia
Security mechanism dealing with protection of the networking system as a whole and sustain its capability to provide connectivity between the communicating entities.
Full Text Chapter Download: US $37.50 Add to Cart
Policy for Mobile Devices to Access Grid Infrastructure
Security mechanism dealing with protection of the networking system as a whole and sustain its capability to provide connectivity between the communicating entities.
Full Text Chapter Download: US $37.50 Add to Cart
Scheduling Large-Scale DNA Sequencing Applications
Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together.
Full Text Chapter Download: US $37.50 Add to Cart
IDS and IPS Systems in Wireless Communication Scenarios
Those activities, techniques, or rules dedicated to prevent, protect, and preserve information and resources.
Full Text Chapter Download: US $37.50 Add to Cart
Enhancing Cybersecurity Protocols in Modern Healthcare Systems: Strategies and Best Practices
This involves the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security is a fundamental aspect of cybersecurity in healthcare systems, where patient data and healthcare services often rely on networked technologies.
Full Text Chapter Download: US $37.50 Add to Cart
Penetration Testing and Cyber Security Studies in Bangladesh: Post-COVID-19 Managerial Issues
Our network and its data will be safe from invasions, breaches, and other dangers if we have adequate network security. This is a broad and all-encompassing phrase that refers to the many hardware and software solutions, as well as the procedures, policies, and settings that are associated with the usage of networks, accessibility, and overall protection against threats.
Full Text Chapter Download: US $37.50 Add to Cart
Exploring the Emerging Potential of the Metaverse in Education: Gamification, Advantages, and Limitations
In this context, it encompasses individuals' well-being in both their physical and psychological aspects. It refers to the potential challenges and risks associated with the extensive use of the Metaverse, including addiction, excessive internet usage, mental health issues, neglect of daily life responsibilities, and the need for strategies and recommendations to address these concerns.
Full Text Chapter Download: US $37.50 Add to Cart
Trust Determination in Wireless Ad Hoc Networks
Network security involves securing computer network infrastructure from being attached by adversary or malicious nodes and it has become a primary concern in order to provide protected communication between nodes in a potentially hostile ad hoc environment.
Full Text Chapter Download: US $37.50 Add to Cart
Cloud Security: Challenges, Solutions, and Future Directions: Navigating the Complexities of securing Cloud
The practice of preventing and protecting against unauthorized intrusion into corporate networks.
Full Text Chapter Download: US $37.50 Add to Cart
Contemporary Security Threats: Some Proposals for Banking Networks in Bangladesh
Our network and its data will be safe from invasions, breaches, and other dangers if we have adequate network security. This is a broad and all-encompassing phrase that refers to the many hardware and software solutions, as well as the procedures, policies, and settings that are associated with the usage of networks, accessibility, and overall protection against threats.
Full Text Chapter Download: US $37.50 Add to Cart
A Novel Intrusion Detection System for Smart Space
Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together.
Full Text Chapter Download: US $37.50 Add to Cart
Vulnerability Analysis and Defenses in Wireless Networks
Network security is a mechanism dealing with protection of the networking system as a whole and sustaining its capability to provide connectivity between the communicating entities.
Full Text Chapter Download: US $37.50 Add to Cart
Cyber Secure Man-in-the-Middle Attack Intrusion Detection Using Machine Learning Algorithms
Network security provides better security system during network data transmission.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR