COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY During the initial days of the internet, its use was limited to military and universities for research and development purposes. Later when all networks merged together and formed the internet, the data was used to travel through a public transit network. Common people may send data that can be highly sensitive such as their bank credentials, username, and passwords, personal documents, online shopping details, or confidential documents. All security threats are intentional i.e. they occur only if intentionally triggered. Security threats can be divided into the following…