Information Security is the measures taken to protect the information from unauthorized access and use. It provides confidentiality, integrity, and availability. It is the superset that contains cyber security and network security. It is necessary for any organization or firm that works on a large scale.
Examples and inclusion of Information Security are as follows:
1. Procedural Controls
2. Access Controls
3. Technical Controls
4. Compliance Controls
Network Security: Network Security is the measures taken by any enterprise or organization to secure its computer network and data using both hardware and software systems. This aims at securing the confidentiality and accessibility of the data and network. Every company or organization that handles a large amount of data, has a degree of solutions against many cyber threats.
Examples and inclusion of Network Security are as follows:
1. Firewall
2. Network Segmentation
3. Remote Access VPN
4. Email Security
5. Intrusion Prevention Systems (IPS)
6. Sandboxing
7. Hyperscale Network Security.
8. Data Loss Prevention (DLP)
Difference between Information Security and Network Security:
Parameters | Information Security | Network Security |
Data | It protects information from unauthorized users, access, and data modification. | It protects the data flowing over the network. |
Part of | It is a superset of cyber security and network security. | It is a subset of cyber security. |
Protection | Information security is for information irrespective of the realm. | It protects anything in the network realm. |
Attack | It deals with the protection of data from any form of threat. | It deals with the protection from DOS attacks. |
Scope | It strikes against unauthorized access, disclosure modification, and disruption. | Network Security strikes against trojans. |
Usage | It provides confidentiality, integrity, and availability. | It provides security over the network only. |
Ensures | Information security ensures to the protection of transit and stationary data. | Network security ensures to protect the transit data only. |
Deals with | It deals with information assets and integrity, confidentiality, and availability. | It secures the data traveling across the network by terminals. |
Source: geeksforgeeks.org
0 comments:
Post a Comment