What is "regional security?

What's the difference between network security and content security?

  • Furthermore, how do different components of enterprise security fit in? I'm confused about branches such as application security, endpoint security, cloud security, mobile security, and wireless security. Any help would be greatly appreciated, and I am not an expert by any means (so please answer as if you're talking to a 5 year old). Thanks!

  • Answer:

    This is a fair question and I will answer based, on your 5 year old request. What Is Network Security? In answering the question What is network security?, I can explain that network security refers to any activities designed to protect your network. Specifically, these activities protect the usability, reliability, integrity, and safety of your network and data. Effective network security targets a variety of threats and stops them from entering or spreading on your network. What Is Network Security and How Does It Protect You? After asking What is network security?, you should ask, What are the threats to my network? Many network security threats today are spread over the Internet. The most common include: Viruses, worms, and Trojan horses Spyware and adware Zero-day attacks, also called zero-hour attacks Hacker attacks Denial of service attacks Data interception and theft Identity theft How Does Network Security Work? To understand What is network security?, it helps to understand that no single solution protects you from a variety of threats. You need multiple layers of security. If one fails, others still stand. Network security is accomplished through hardware and software. The software must be constantly updated and managed to protect you from emerging threats. A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security. Network security components often include: Anti-virus and anti-spyware Firewall, to block unauthorized access to your network Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks Virtual Private Networks (VPNs), to provide secure remote access What Is Content Security? Content Security means different things to different organizations. For enterprises, it's often about confidentiality and legal concerns. For the media and publishers, it's about making sure content - or intellectual property - isn't stolen or illegally reproduced. When digital files or text can be transferred with the click of a button, or posted on a new site with a simple copy and paste, age old concerns about copyright go into overdrive. Content security has come a long way since the first days of Napster, when college kids started trading music files like baseball cards. What is the difference between the two? Network Security is simply the protection of the computer and the network, whereas Content Security is the protection of the information which is on that network. Here is the answer for your other queries. Application Security: Application security encompasses measures taken throughout the code's life-cycle to prevent gaps in the security policy of an application or the underlying system (vulnerabilities) through flaws in the design, development, deployment, upgrade, or maintenance of the application. Endpoint Security: Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Cloud Security: Cloud computing security or, more simply, cloud security is an evolving sub-domain of computer security, network security, and, more broadly, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Mobile Security: Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security. Wireless Security: Wireless security is the prevention of unauthorized access or damage to computers using wireless networks.

Philan James at Quora Visit the source

Was this solution helpful to you?

Other answers

network security is concerned with making sure there isn't any unauthorized traffic flowing through the network and that there isn't anyone abusing or gaining illegitimate access to network resources. content security is concerned with making sure that content (such as the stuff in a database or website content {which in turn often comes out of a database}) is not accessed illegitimately or modified maliciously (such as inserting malicious data that exploits users of the content). application security is concerned with eliminating software vulnerabilities at the design and implementation stage. this requires the programmers who make the software to be aware of problems that can lead to security vulnerabilities and know how to avoid them. endpoint security is concerned with keeping malicious software/users off of your computer(s). this is where things like anti-virus software, white-listing software, etc. come into play. cloud security is concerned with keeping cloud-based services secure, so that they remain available and any data within them doesn't get leaked or corrupted. mobile security can overlap quite a bit with endpoint security (since mobile devices are a kind of endpoint) but also involves concepts such as remotely locking or wiping lost mobile devices. wireless security is concerned with keeping wireless communications (frequently wifi) secure, so that attackers can't read or modify the traffic being broadcast over the airways, and can't access the resources that respond to that wireless traffic.

Kurt Wismer

Network Security controls access to content. Content Security controls what you do with that content.

Marc Runkel

All those various types of security fit into enterprise security in the same way that the things they secure fit into enterprise IT.   It's confusing because these terms represent different layers of security much like the things they secure are different layers in an enterprise application which all work together / overlap depending on the layer. Network security protects the information that has left your computer and is moving towards your friend's computer (5 year old language :-) ).   It prevents the information from being intercepted or modified within the network.  It also prevents someone else on the network from pretending to be you and adding foreign data to yours (man-in-the-middle attack) Wireless security is a type of network security that is used by wireless networks.  It is made out off security settings (capabilities) using standard protocols in wireless components (routers, access points). Endpoint security is about securing the data at the place the data enters and leaves the network.  In addition to network security it also includes physical security  (who is allowed to touch the device) and user access security (who is allowed to log into the device). Cloud security is endpoint security specialized for a cloud environment and includes security to prevent your program and data from being seen by other applications using the cloud.  This is no different in concept than the types of security used in any multi-user system (Unix, Z/OS) Mobile security is a type of endpoint security specialized for mobile devices (smart phones, tablets).  The specialization includes allowing the device to move around and not have to continually ask the user for credentials yet still be safe if the device is snatched from the original owner. Application security relies on all these types of security and typically doesn't pay too much attention to them.  In addition, application security defines what functions of the application different people are allowed to use (role based security) and what data in the application different people are allowed to see.

Joe Herman

Content security refers to protecting your content. If an unsecured content leaves your secured network, that document is now unprotected. With a content security tool such as Protectedpdf http://www.vitrium.com, you can be sure that the content remains safe even if it leaves your secured network.

Kelvin Kwok

Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work. Content Security means different things to different organizations. For enterprises, it's often about confidentiality and legal concerns. For the media and publishers, it's about making sure content - or intellectual property - isn't stolen or illegally reproduced.When digital files or text can be transferred with the click of a button, or posted on a new site with a simple copy and paste, age old concerns about copyright go into overdrive. Content security has come a long way since the first days of Napster, when college kids started trading music files like baseball cards. For more information please visit http://cyberoam.com

Andrew Lewis

Just Added Q & A:

Find solution

For every problem there is a solution! Proved by Solucija.

  • Got an issue and looking for advice?

  • Ask Solucija to search every corner of the Web for help.

  • Get workable solutions and helpful tips in a moment.

Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.