It is type of security provided to apps simply by finding, fixing, and preventing security vulnerabilities. | It is type of security provided to network from unauthorized access and risks. |
Its main goal is to make app more secure and prevent data or code from being stolen or hijacked. | Its main goal is to take physical and software preventative measures to protect underlying networking infrastructure. |
It makes application more secure, keep confidential information safe and secure, reduces risks from both internal and third-party sources, protects sensitive data from leaks, etc. | It makes network more secure, protects proprietary information, reduce risks of data loss, theft and sabotage, build trust, etc. |
Tools used for application security includes SAST, DAST, IAST, etc. | Tools used for network security includes Wireshark, AirCrack, Metasploit, etc. |
It relies on how applications operate and looks for anomalies in those operations. | It relies on ability to scan traffic on enterprise network. |
It is generally remediated or corrected by Programmers. | It is generally remediated or corrected by Network Admins. |
It includes business logic security issues. | It includes integration issues. |
Its key features include authentication, authorization, logging, encryption, and application security testing. | Its key features include perimeter security, data privacy, security monitoring, policy management, etc. |
It is a process of developing, adding, and testing security features within application to prevent security vulnerabilities. | It is a process of preventing unauthorized activity across given networking infrastructure. |