Compare the Difference Between Similar Terms

Difference Between

Home / Technology / IT / Security / Difference Between Network Security and Information Security

Difference Between Network Security and Information Security

July 2, 2011 Posted by Indika

Network Security vs Information Security

Network security involves methods or practices used to protect a computer network from unauthorized accesses, misuses or modifications. Networks owned by different organizations require different levels of security. For example, level of security required by a home network would be different than the level of security required by a network of a large cooperation. Similarly, Information security prevents unauthorized accesses, misuses and modifications to information systems and basically it protects information.

What is Network Security?

Networks security is concerned with protecting a network from unauthorized accesses. The first step of this process is authenticating a user. Typically a username and a password are used for this. This is called one-factor authentication. In addition you can use two-factor or three-factor authentication schemes that involves verifying fingerprints or security tokens. After authenticating a user, a firewall is used to make sure that the user accesses only the services that are authorized to her. In addition to authenticating users, network should also provide security measures against computer viruses, worms or Trojans. To protect a network from these antivirus software and intrusion prevention systems (IPS) can be used. As mentioned earlier, different types of networks require different levels of security. For a small network of a home or a small business, a basic firewall, antivirus software and robust passwords would suffice, whereas a network of an important government organization might need to be protected using a strong firewall and proxy, encryption, strong antivirus software and a two- or three-factor authentication system, etc.

What is Information Security?

Information security is concerned with protecting information from getting in to the hands of unauthorized parties. Traditionally, main principles of information security are considered as providing confidentiality, integrity and availability. Later, some other elements like possession, authenticity and utility were proposed. Confidentiality concerns with preventing information from going in to unauthorized parties. Integrity makes sure that information cannot be modified secretly. Availability is concerned with whether the information is available when they are required. Availability also makes sure that the information system is not susceptible to attacks like denial-of-service (DOS). Authenticity is important for verifying the identities of two parties involved in a communication (that carry information). In addition, information security uses cryptography, especially when transferring information. Information would be encrypted such that it would be unusable to anyone other than the authorized users.

What is the difference between Network Security and Information Security?

Network security involves methods or practices used to protect a computer network from unauthorized accesses, misuses or modifications, whereas Information security prevents unauthorized accesses, misuses and modifications to information systems. In practice, software and tools used for achieving network security and information security might overlap. For example, antivirus software, firewalls and authentication schemes have to be employed by both the tasks. But the goals tried to be achieved by using them are different. Further, these two tasks complement each other in the sense if you cannot make sure that the network is secure, you can never guarantee that the information in the network is secure.

Related posts:

Difference Between Cloud Security and Cloud Access Security Difference Between Cryptography and Steganography Difference Between Avast and AVG Difference Between Stream Cipher and Block Cipher Difference Between Hashing and Encrypting

Filed Under: Security Tagged With: Antivirus software, authenticating, cryptography, Encryption, fingerprint recognition, information security, intrusion prevention systems, Network security, one-factor authentication, security tokens, three-factor authentication, two-factor authentication

About the Author: Indika

Indika, BSc.Eng, MSECE Computer Engineering, PhD. Computer Science, is an Assistant Professor and has research interests in the areas of Bioinformatics, Computational Biology, and Biomedical Natural Language Processing.

Comments

  1. distrowatch says

    July 21, 2015 at 12:20 pm

    thanks a lot ! there was no Persian website to tell the diffrenece between these two course 🙂

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Request Article

Featured Posts

Difference Between Coronavirus and Cold Symptoms

Difference Between Coronavirus and Cold Symptoms

Difference Between Coronavirus and SARS

Difference Between Coronavirus and SARS

Difference Between Coronavirus and Influenza

Difference Between Coronavirus and Influenza

Difference Between Coronavirus and Covid 19

Difference Between Coronavirus and Covid 19

You May Like

Difference Between Ammonium Hydroxide and Sodium Hydroxide

Difference Between Ammonium Hydroxide and Sodium Hydroxide

Difference Between Traditional Approach and Modern Approach on Conflict

Difference Between Traditional Approach and Modern Approach on Conflict

What is the Difference Between Acetylacetone and Acetylacetonate Ion

What is the Difference Between Acetylacetone and Acetylacetonate Ion

Difference Between Voluntary and Compulsory Redundancy

Difference Between Direct and Indirect Speech

Difference Between Direct and Indirect Speech

Latest Posts

  • What is the Difference Between Foundation and BB Cream
  • What is the Difference Between Cybrids and Hybrids
  • What is the Difference Between Hapten and Adjuvant
  • What is the Difference Between Omphalocele and Gastroschisis
  • What is the Difference Between Autonomic and Somatic Reflexes
  • What is the Difference Between Plagiocephaly and Craniosynostosis
  • Home
  • Vacancies
  • About
  • Request Article
  • Contact Us

Copyright © 2010-2018 Difference Between. All rights reserved. Terms of Use and Privacy Policy: Legal.