Network Security - Proposals

نویسنده

  • Madhavi Latha
چکیده

The explosion of the public Internet and ecommerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees and even human error all represent clear and present dangers to networks. Loss of irreplaceable data is a very real threat for any business owner whose network connects to the outside world. Remote access for employees and connection to the Internet may improve communication in ways you’ve hardly imagined. Access to the Internet can open the world to communicating with customers and vendors, and is an immense source of information. But these same opportunities open a local area network (LAN) to the possibility of attack by thieves and vandals.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SDN Security: A Survey

The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...

متن کامل

SDN Security: A Survey

The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...

متن کامل

Algorithms and Approaches of Proxy Signature: A Survey

Numerous research studies have been investigated on proxy signatures over the last decade. This survey reviews the research progress on proxy signatures, analyzes a few notable proposals, and provides an overall remark of these proposals.

متن کامل

A Study of Challenges and Security Issues on 4G Network

The detail study of latest advances in wireless network security issues and donations to the wireless networking field. The 4G network technologies guarantee high speed simplicity of right to use during any wireless mechanism by integrate non IP based and IP based strategy and representing services as a entire that the industry is tackle and finally, developing some of the estimated proposals. ...

متن کامل

NSF Activities in Cyber Trust

“Cyber Trust” is an umbrella term under which NSF/CISE has organized research focused on improving the ability of a computer-based component or system to repel, resist, detect, or tolerate malicious attacks while providing a desired function. Cyber Trust encompasses security (in terms of secrecy, confidentiality, integrity and availability), as well as privacy, correctness, reliability, safety ...

متن کامل

Radio Frequency Identification - A Review of Low Cost Tag Security Proposals

With the increased awareness of the potential of RFID technology across a range of applications and as a new source of information emerge new points of attack. Due to cost issues most proposals focus on securing the RFID reader rather than the tag. This paper investigates some of the low-cost proposals for securing RFID tags from potential misuse through authentication and encryption.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013