Limerick, Ireland

Information & Network Security

Master's
Table of contents

Information & Network Security at UL

Language: EnglishStudies in English
Subject area: security services
Qualification: Level 9 NFQ
Degree - Masters (Level 9 NFQ)
University website: www.ul.ie/

Definitions and quotes

Information
Information is any entity or form that provides the answer to a question of some kind or resolves uncertainty. It is thus related to data and knowledge, as data represents values attributed to parameters, and knowledge signifies understanding of real things or abstract concepts. As it regards data, the information's existence is not necessarily coupled to an observer (it exists beyond an event horizon, for example), while in the case of knowledge, the information requires a cognitive observer.
Network Security
Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.
Security
Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) from external forces. Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, and any other entity or phenomenon vulnerable to unwanted change by its environment.
Information
Do not seek for information of which you cannot make use.
Anna C. Brackett (1836–1911), American author. The Technique of Rest, Ch. 2 (1892).
Information
Data, seeming facts, apparent asso­ciations-these are not certain knowledge of something. They may be puzzles that can one day be explained; they may be trivia that need not be explained at all.
Kenneth Waltz, Theory of International Politics (1979), Ch. 1 : Laws and Theories
Information
It used to be said that information is power. As w:Arthur Sulzberger Jr., chairman of the board of the New York Times Co., rightly says, "Information is now ubiquitous. Power is understanding."
Martin Kaiser, in INFORMATION: The news will be exciting and so will the medium Milwaukee Journal Sentinel, 2 January 2000.
Privacy Policy