COMPUTER SECUIRTY WITH COMPUTER PROTECTIONAND NETWORK MANAGEMENT

Abstract

Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them,aswellasfrom disruption or misdirection of the services they provide. It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection,] and due to malpractice by operators, whether intentional, accidental, or due to thembeing tricked into deviating from secure procedures.The field is of growing importance due to the increasing reliance on computer systems in most societies and the growth of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things – and of the Internet and wireless network such as Bluetooth and Wi-Fi.

Authors and Affiliations

Smt Ambikatai V Mittapally*

Keywords

Related Articles

 Leaf Recognition Algorithm Using MLP Neural Network Based Image Processing

 In this paper, we employ Multilayer Perceptron with image and data processing techniques and neural network to implement a general purpose automated leaf recognition. Sampling leaves and photoing them are low cos...

 ANALYSIS AND DESIGN OF FUEL THEFT PREVENTION AND AUTOMATION

 Motorcycles are popular mode of transport. All motorcycles are petrol driven whose costs have been increasing steadily. The motorcycles come with a simple fuel delivery mechanism which is nothing but simple ta...

 ANALYSIS OF EARTHQUAKE LOADS ON G+7 STOREYED BUILDING WITH CONCETRIC BRACING SYSTEM AND ECCENTRIC BRACING SYSTEM USING RESIST SOFTWARE

 The proposed project is to analyze the performance of G + 7 multi storied building for lateral forces, (seismic/wind). Work was carried out considering seismic zones (II, III, IV and V) and hard, medium, soft type...

RELATIVE STUDY OF OUTLIER DETECTION PROCEDURES

Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from the monstrous data sets. Outlier detection is one of the imperative parts of data mining which Rexall discovers the percep...

 DISCRETE POPULATION GROWTH MODEL WITH CONSTANT FORCED REPRODUCTION AND CONSTANT HARVESTING

 A generalization of discrete logistic growth model is considered. Constant harvesting for human consumption of species is taken into account. At the same time, forced reproduction of the same species is also consi...

Download PDF file
  • EP ID EP90775
  • DOI 10.5281/zenodo.56880
  • Views 132
  • Downloads 0

How To Cite

Smt Ambikatai V Mittapally* (30). COMPUTER SECUIRTY WITH COMPUTER PROTECTIONAND NETWORK MANAGEMENT. International Journal of Engineering Sciences & Research Technology, 5(7), 1-5. https://europub.co.uk./articles/-A-90775