عنوان مقاله [English]
The most important advantage and mission for any computer network is to share the hardware and software resources as well as providing a quick and easy access to information. Controlling the extent of access to the shared resources, is one of the most important goals of a network security system. With expansion of computer networks (internet in particular), the attitude towards data security as well as security of other shared resources has entered a new level. It is therefore necessary for organizations to follow a specific strategy for implementation of a security system in order to protect valuable data. An appropriate security system, may lead to somewhat negative, unexpected consequences. Success in securing information is contingent upon protecting information and information systems against intrusions and attacks. To this end numerous security protocols are employed. The present paper attempts to classify these security protocols based on the level of interaction between technology and information as well as levels of security implementation of information systems.