ADVANCE NETWORK SECURITY POLICIES AND VULNERABILITIES OF SECURITY THREATS Dr. Ravi Kanth Motupalli 1 , Dr. O. Naga Raju 2 , V. Surya Narayana Reddy 3 1 Assistant Professor, Department of CSE, VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY, Telangana, India 2 Assistant Professor & Head, Department of CSE, Government Degree College, Macherla, Andhra Pradesh, India 3 Assistant Professor, Department of CSE, VNR VIGNANA JYOTHI INSTITUTE OF ENGINEERING AND TECHNOLOGY, Telangana, India ABSTRACT In addition to the advancement of the web, safety, as well as protection, came to be significant stress. Additionally, the background of security allows a much better understanding of the look of safety advancement. The net structure, on its own, enabled lots of safety threats to happen. The type of the world wide web, when regulated, can easily decrease the practical assaults that could be delivered throughout the network. Recognizing the strike techniques permits appropriate surveillance to surface. Many companies protect on their own, coming from the internet using firewalls in addition to the shield of encryption devices. Businesses make an "intranet" to keep connected to the internet but gotten from possible threats. This paper briefly discussed about the security threats, security vulnerabilities and advance network security policies. Index Terms : security, threats, attacks I. INTRODUCTION TO NETWORK SECURITY When our team speaks about protection, the initial step is exactly how our business defines system safety and security as well as surveillance. If you contact coming from 10 different supervisors involving the meaning of device security, you are going to acquire ten a variety of actions most likely. Regardless, as its title suggests, network safety and security and safety are the safety and security of devices, their make uses of or even companies against baseless access that stops kind customization, acknowledgment, or even damage of information. It similarly assures that the system is accomplishing effectively without damaging side effects. This is, naturally, an immense significance, however a standard interpretation a great deal much better prepares device managers to look after new kinds of strikes. Each firm establishes its safety and security plan that describes the amount of access to, which is enabled or refused. So any association should aid make such a monitoring system that is vast in an array along with aids to handle the brand-new type of assault Security Threats When talking about the danger, it can be any person or activity that can cause the damage of data or system. Hazards may additionally be organic, for example, wind, lightning, flooding, or even maybe unintended, like unintentional removal of the file. Security Vulnerabilities Susceptibilities determined as the weakness in any network that could be exploited through a threat. Just recently, almost in each location, network technologies have been administered, including banking, tax, Shopping. These applications are consist of various network tools and computers. Also, it is incredibly essential to safeguard these applications as well as gadgets Journal of Interdisciplinary Cycle Research Volume XIV, Issue I, January/ 2022 ISSN NO: 0022-1945 Page No: 280