5Network Security in Evolving Networking Technologies: Developments and Future Directions

Uma Yadav1, Ashish Sharma2

1 RTM Nagpur University, Nagpur, India

2Computer Science & Engineering Dept, G H Raisoni College of Engineering, Nagpur, India

Email: uma.yadav12@gmail.com, ashishk.sharma@raisoni.net

Abstract

More than one computer system interconnected through wired or wireless links forms a network. Apart from a variety of networking protocols, networks broadly use client-server or peer-to-peer architecture for linked devices to communicate with each other. A networking subgroup includes network security. It necessitates safeguarding the network architecture that links the network’s core to the network’s edge. Network protection includes the implementation of IT security protocols and the deployment of network applications and hardware to protect the network, its infrastructure, and all of its traffic against unwanted cyberattacks, to defend against unauthorized access to all IT assets and resources available through the network, and to ensure that approved users have adequate access to all IT assets and resources in order to work effectively. The rapid expansion of the computer network infrastructure provides customers with excellent convenience as well as new security challenges. The topic of network protection typically consists of network infrastructure security and data security. It specifically relates to the network system’s security, privacy, integrity and availability ...

Get Evolving Networking Technologies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.