A Study on Network Security Aspects and Attacking Methods
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 2
Abstract
Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an “intranet” to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed.
Authors and Affiliations
P. ARUNA DEVI ,
Novel Design and Implementation of Timesheet Management System Case Study
Time Sheet Management implementation is an internal application developed for efficient functioning of an organization. Time sheet management is used monitor all the employees of a particular organization working on vari...
A Survey on Hierarchical Routing Protocols in Wireless Sensor Networks
There is several issues in Wireless Sensor Networks from which routing are also a major issue which is directly related to energy consumption. In order to increase the lifetime of network energy must be consumed...
Speaker Independent Recognition System with Mouse Movements
Speech recognition is potentially a multi-billion dollar industry in the near future. It is a natural alternative interface to computers for people with limited mobility in their arms and hands, sight, hearing limi...
Information at Your Fingertips Anywhere Anytime Anyway (A3) MCC – Survey
The cloud means total cost of ownership to build and maintain the datacenter infrastructure which includes both hard and soft related costs. An accurate comparison requires knowledge of all available over the life of the...
Multicast Routing Techniques To Make Optical Network Survivable Against Single Link/Node Failure.
Link/Node failures are very common in any networks but these failures have a huge impact on the overall performance of the network. Due to these link/node failures sometimes it is impossible to communicate in b/w t...