Answer Description
Local users should not be utilized whenever possible. Domain environments should authenticate users via the domain controller whenever possible. This eliminates numerous security vulnerabilities, such as controlling access to the PC if it is stolen and ensuring deactivated users cannot access a PC with non-domain credentials.
Wikipedia
Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources Network security involves the authorization of access to data in a network, which is controlled by the network administrator Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority Network security covers a variety of computer networks, both public and private, that are used in everyday jobs: conducting transactions and communications among businesses, government agencies and individuals Networks can be private, such as within a company, and others which might be open to public access
Network_security - Wikipedia, the free encyclopedia