Network Security Issues and Solutions
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 6
Abstract
Network security is now days becoming more and more important because people like to connect with each other all the time via internet. Personal computer users, employees of professional organizations, government servants, academicians, social workers, students, military peoples etc are very familiar to use network currently and all these people use the available network for most of their work. All these people keep their most important data on internet and also do the money related online transactions. The internet structure is itself such that there may be possibility of threats to occur. To secure our network we must have to know which type of security threats may occur and how? By knowing this we may able to find out security methods against these threats.
Authors and Affiliations
Mrs. Bhumika S. Zalavadia
Workflow Scheduling Algorithms in Grid Computing
Grid computing is a process of aggregate the functionality of different geographically resources and provide services to the user. Scheduling is most popular research area in grid computing for achieving high performance...
Stemmers for Tamil Language: Performance Analysis
Stemming is the process of extracting root word from the given inflection word and also plays significant role in numerous application of Natural Language Processing (NLP). Tamil Language raises several challenges to NLP...
Performance Evaluation of Edge-based Video Error Concealment using H.264 Flexible Macroblock Ordering
This paper evaluates the directional interpolation scheme used widely for spatial error concealment in the H.264/AVC video coding standard using Flexible Macroblock Ordering (FMO). A mathematical analysis of FMO is prese...
Advantages of Blackman Window over Hamming Window Method for designing FIR Filter
In signal processing, there are mainly two types of filters exist and the are Finite Impulse Response(FIR) filter and Infinite Impulse Response(IIR) filter. Finite Impulse Response(FIR) filter can be designed form Infini...
A SURVEY ON SECURING MANETS FROM MALICIOUS BEHAVIOR BY DETECTION MECHANISM
There is a migration from wired network to wireless network in last few years due to the property of mobility and scalability. Mobile Ad hoc network is an infrastructure less network. Each node in Mobile Ad hoc Network a...