Overview: Importance of Network Security and Future Issues
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent a cross the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an “intranet” to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a briefhistory dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed.
Authors and Affiliations
El Mutaz Mahdi Osman Elawad, Dr. Haala El Dawo
Optimal Planning of the Production of Corpus Details on Metal Cutting Machines with the Help of Computer Numeric Control
Abstract: The optimal planning of details mechanical processing is a key problem, directly affecting the productivity and efficiency of the activity of a machine building company. The combinatorial character of the prob...
An in-building multi-server cloud system based on shortestPath algorithm depending on the distance and measuredSignal strength
Abstract: In this paper we are proposing a system that will work as a virtual cloud computing environment.Our system will be suitable for an office for example software development firm. Cloud Computing is anemergi...
Implementing Security algorithm to worm hole attack using AOMDV protocol & comparison using NS2 simulator
Abstract: In present era, where every person has become addicted to wireless networks, MANET’S has fulfilled the demand of the people by removing the dependency of fixed network. Mobile ad-hoc networks have extende...
Data Analytics on Application Logs for Managing API-related Dependencies
Abstract: There are innumerable APIs (Application Programming Interface) that are being created every single day as they serve as a rudimentary tool in developing software applications in today’s technology-driven indust...
Various Techniques of Clustering: A Review
Abstract: Data mining is a method that is used to select the information from large datasets and it performs the principal task of data analysis. The Clustering is a technique that consist groups of data and elemen...