Copyright

How to Test Network Security

An error occurred trying to load this video.

Try refreshing the page, or contact customer support.

Coming up next: Why is Network Security Important?

You're on a roll. Keep up the good work!

Take Quiz Watch Next Lesson
 Replay
Your next lesson will play in 10 seconds
  • 0:04 Preparing for the Worst
  • 0:39 What Is Network Security?
  • 1:31 Network Security Testing
  • 3:14 Tools Used for Network…
  • 3:50 Lesson Summary
Save Save Save

Want to watch this again later?

Log in or sign up to add this lesson to a Custom Course.

Log in or Sign up

Timeline
Autoplay
Autoplay
Speed Speed
Lesson Transcript
Instructor: David Gloag

David has over 40 years of industry experience in software development and information technology and a bachelor of computer science

A network is the foundation of most businesses these days. In this lesson, we'll take a look at network security: what it is, how to test it, and some tools that can be used for testing.

Preparing for the Worst

Everyone has a network or has access to a network these days. There is the Internet and its millions of daily users; there are business networks that help employees work together to achieve goals; and there are even home networks that connect family members. Networks are an integral part of our daily lives. Unfortunately, this means that there will be those who will attempt to exploit these networks; those that seek personal gain or to do us harm. Still, there are the means to combat this through network security and tools that can ensure the effectiveness of that security.

What Is Network Security?

Network security is the umbrella term used to describe any software or devices that protect a network's infrastructure. They are meant to address a wide variety of threats that include:

  • Unauthorized access: This arises when someone tries to access the network without the necessary authorization.
  • Malicious use: This arises when someone tries to use the network in a way that provides personal gain or is contrary to network policy.
  • Faults: This arises when a network resource (software or hardware) fails in an unexplained fashion.
  • Tampering: This arises when a network resource (software or hardware) fails but in an intended fashion.
  • Destruction: This arises when willful damage is caused to the network.
  • Disclosure: This arises when important information is revealed without authorization.

Network Security Testing

Network security testing must be comprehensive, but that goes without saying. If there is a weakness of any type, a motivated attacker will find it. As such, testing typically takes a detailed look at the following:

To unlock this lesson you must be a Study.com Member.
Create your account

Register to view this lesson

Are you a student or a teacher?

Unlock Your Education

See for yourself why 30 million people use Study.com

Become a Study.com member and start learning now.
Become a Member  Back
What teachers are saying about Study.com
Try it risk-free for 30 days

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Create an account to start this course today
Try it risk-free for 30 days!
Create an account
Support