Disaster and Recovery Approachfor Various Online Attacks

Journal Title: International Journal of Engineering and Science Invention - Year 2017, Vol 6, Issue 7

Abstract

Information Security has become a monstrous issue to worry about every network today. Attackers these days are smart enough to attack any vulnerable data or the data having a minute loophole. Earlier attackers were from outside the organization but today they might be working within the organization also. They not only have a motive to misuse the data but they also breach security by using automated tools to investigate network systems and hence exploits any vulnerable security point and try to gain malicious access to that network. Also due to weak security policies, data, code and many processes of organizations various internal and external breach takes place. Firewall is a hardware or software device which is designed to permit or refuse network transmission based upon certain protocols but still, various security problems keep on arising. To further gain and invigorate the network from illegitimate entry the concept of Intrusion Detection System (IDS) and Intrusion Protection System (IPS)is applied. This paper is a review paper on distinct Disaster and Recovery Approach for Online Attacks, Intrusion Detection System (IDS) and Intrusion Protection System (IPS)and their different types.

Authors and Affiliations

Aakanksha Chopra

Keywords

Related Articles

Concept Design of Disasters Information Integration System for Super High-rise Buildings based on BIM/GIS

This paper is intended to introduce the objective of the study. The ultimate objective of the study is to provide an integrated disasters information system to respond for rapid restoration assistance and reduction in da...

Fuzzy Rule-Base Expert System Assessment Possibility Of Allergy

The allergy based diagnostic expert organization (ABExS) is designed to help or assistance the psychological science doc to diagnosing the various mental upset related to human being. ABExS can be used to perform some ra...

Adaptive Charging Protocol (ACP) based on Non-linear Voltammetry (NLV) Charging Patterns for Fast charging Li-Ion batteries.

This research work presented in this paper strongly emphasis the suitability of the Adaptive charging protocol (ACP) based on non-linear voltammetry (NLV) charging patterns for fast charging Li-ion batteries (LIBs). The...

Experimental Study of Image SegmentationUsing K-Means Clustering Algorithm with Image Quality Metrics

Image Segmentation has been considered as one of the significant tool for image analysis. The main objective of image analysis is to understand the component of the image and extract useful information using image featur...

A study of on-site material management handling practices & rating of the different construction sites in Ahmadabad city.

This paper is written to show the issue in material management system in construction projects as there is approximately 60% of the capital cost in construction project consist of Material cost. Therefore, it is essentia...

Download PDF file
  • EP ID EP403250
  • DOI -
  • Views 77
  • Downloads 0

How To Cite

Aakanksha Chopra (2017). Disaster and Recovery Approachfor Various Online Attacks. International Journal of Engineering and Science Invention, 6(7), 40-45. https://europub.co.uk./articles/-A-403250