European Academic Research ISSN 2286-4822
ISSN-L 2286-4822
Impact Factor: 3.4546 (UIF)
DRJI Value : 5.9 (B+)
Article Details :
Article Name :
A Review Paper on Network Security Attacks and Defences
Author Name :
ALLYSA ASHLEY M. PALAMING
Publisher :
Bridge Center
Article URL :
Abstract :
In this paper it involves the decision making in multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. Data security is the extreme critical factor in ensuring the transmission of information via the network. In this paper we study about various types of attacks on network security and how to handle or prevent this attack. There are more network security measure to protect the data from attackers like antivirus software, firewalls, cryptography etc. Network security is a challenging problem due to the complexity of underlying hardware, software, and network interdependencies. There was also a discussion about antivirus and internet security programs can protect a programmable device from malware by detecting and eliminating viruses; Antivirus software was mainly shareware in the early years of the Internet, but there are now several free security applications on the Internet to choose from for all platforms. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the users screen, spamming their contacts, logging, or even rendering the computer useless. Black hat or Cracker- The opposite of White Hat, this term is used to describe those individuals who use their knowledge of computer systems and programming skills. In the implementation of cloud antivirus involves scanning suspicious files using multiple antivirus engines which was an early implementation of the cloud antivirus concept called CloudAV. In online scanning to maintain websites with free online scanning capability of the entire computer, critical areas only, local disks, folders or files. Parallel scanning of files using potentially incompatible antivirus scanners is achieved by spawning a virtual machine per detection engine and therefore eliminating any possible issues. Periodic online scanning is a good idea for those that run antivirus applications on their computers because those applications are frequently slow to catch threats.
Keywords :
network security, attack, network management, wireless sensor, network

Announcements
New Launched Project
onlineresearch
Recommend & Share