Article Details : |
| | Article Name : | | A Review Paper on Network Security Attacks and
Defences
| Author Name : | | ALLYSA ASHLEY M. PALAMING
| Publisher : | | Bridge Center | Article URL : | | | Abstract : | | In this paper it involves the decision making in multiple levels
and multiple time scales, given the limited resources available to both
malicious attackers and administrators defending networked systems.
Data security is the extreme critical factor in ensuring the transmission
of information via the network. In this paper we study about various
types of attacks on network security and how to handle or prevent this
attack. There are more network security measure to protect the data
from attackers like antivirus software, firewalls, cryptography etc.
Network security is a challenging problem due to the complexity of
underlying hardware, software, and network interdependencies.
There was also a discussion about antivirus and internet
security programs can protect a programmable device from malware
by detecting and eliminating viruses; Antivirus software was mainly
shareware in the early years of the Internet, but there are now several
free security applications on the Internet to choose from for all
platforms. Network security consists of the provisions and policies
adopted by a network administrator to prevent and monitor
unauthorized access, misuse, modification, or denial of a computer
network and network-accessible resources. Viruses often perform some
type of harmful activity on infected hosts, such as stealing hard disk
space or CPU time, accessing private information, corrupting data,
displaying political or humorous messages on the users screen,
spamming their contacts, logging, or even rendering the computer useless. Black hat or Cracker- The opposite of White Hat, this term is
used to describe those individuals who use their knowledge of computer
systems and programming skills.
In the implementation of cloud antivirus involves scanning
suspicious files using multiple antivirus engines which was an early
implementation of the cloud antivirus concept called CloudAV. In
online scanning to maintain websites with free online scanning
capability of the entire computer, critical areas only, local disks,
folders or files. Parallel scanning of files using potentially
incompatible antivirus scanners is achieved by spawning a virtual
machine per detection engine and therefore eliminating any possible
issues. Periodic online scanning is a good idea for those that run
antivirus applications on their computers because those applications
are frequently slow to catch threats. | Keywords : | | network security, attack, network management, wireless
sensor, network |
|
|
|
|
|
|
Announcements
|
- Volume 9, issue 5, August issue - publishing in progress
- Volume 9, Issue 2/ May 2021 publishing IN PROGRESS
- Call for Papers: open. Articles will be uploaded constantly, once the evaluation process is complete.
- The Certificates of Publication can be downloaded from RECEIVED ARTICLES section.
- COVER - VOLUME 2, ISSUE 12 / MARCH 2015
- COVER - VOLUME 3, ISSUE 2 / MAY 2015
- COVER - VOLUME 3, ISSUE 3 / JUNE 2015
- COVER - VOLUME 3, ISSUE 4 / JULY 2015
- COVER - VOLUME 3, ISSUE 8/ NOVEMBER 2015
- COVER - VOLUME 4, ISSUE 4 / JULY 2016
- COVER - VOLUME 4, ISSUE 5 / AUGUST 2016
- COVER - VOLUME 7, ISSUE 11/ FEBRUARY 2020
- Volume 9, issue 3, June 2021 publishing in progress
|
|
New Launched Project |
|
|
Recommend & Share
|
|