answersLogoWhite

0

First the advantages. A secure network has much less likelihood of unauthorized access which could result in corrupted data, stolen data, or malicious damage to a database. Some form of encryption is usually used to make data unreadable even if it is stolen. The chief disadvantage is slowdown of the system. Encrypted data must be un-encrypted, users have to be verified, some IP addresses have to be blocked, etc.

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

What are advantages and disadvantages of linked storage?

Advantage everyone on the network should have access. The disadvantage is that if the network storage is not security protected anyone could gain access


What are the advantages and disadvantages of adhoc networks?

Advantage: Easy to set up Cheap Disadvantage: Lack of security. Thus ad-hoc network is also called unsecure networks.


In future if everyone has home network connected to a computer terminal what is the disadvantage?

The only disadvantage will be internet speed.


How often do you run computer network security?

If a computer system is operating then it should be utilizing network security. So the answer would be all the time.


What are the disadvantage of network security?

Network security usually is not that simple to implement and support especially on industrial level. Also it costs a lot of money to have proper equipment.


How can I find out my computer's security network info?

To find out specific information about your computers network security you can contact your network admin


What is an example of computer network security?

i dono


What is the advantage and dis advantage topology?

Topology in networking refers to the arrangement of different elements (links, nodes, etc.) in a computer network. The advantage of topology is that it can enhance network performance and reliability by optimizing data flow and minimizing bottlenecks. However, a disadvantage is that certain topologies can be complex and costly to implement or maintain, and failures in specific configurations (like a star topology) can disrupt the entire network. Choosing the right topology depends on the specific needs and scale of the network.


What has the author Gerald D Cole written?

Gerald D. Cole has written: 'Design alternatives for computer network security' -- subject(s): Computer networks, Computer security, Security measures 'Implementing OSI networks' -- subject(s): Computer network architectures, Computer network protocols, Computer networks 'Computer networking for systems programmers' -- subject(s): Computer networks, Systems programming (Computer science)


What advantage and disvantage network internet on information security?

See related link


Which AF system security instruction contains security requirements for the web server?

Network & Computer security


How does one do network security?

Network security can be done in a variety of manners. In general, the methods to perform network security involve constantly updating hardware and software to combat potential computer threats.