International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 43    Submit Your Rating     Cite This   Download        Certificate

NETWORK SECURITY

    2 Author(s):  MS. SUSHILA , MRS. SUNITA

Vol -  5, Issue- 12 ,         Page(s) : 6 - 9  (2014 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Abstract:- This paper present a review of how to secure our computer network. Today's attacks are succeeding far too frequently, all due to the limitations of legacy security tools. Because many security technologies arose in an earlier era—when attacks targeting sensitive information were fairly straightforward to identify—these tools fail when they cannot recognize a previously unknown attack or threat vector. In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more focused adversary with the resources and capabilities to target highly sensitive information, often through long-term attack campaigns.

  1. Andrew S. Tanenbaum,  Computer networks, Vrije Universiteit, Amsterdam, The Netherlands, PEARSON Prentice Hall.
  2. Behrouz A. Forouzan, Network security, DeAnza College with Catherine Coombs and Sofia Chung Fegan, McGraw Hill.
  3. Dr. Satinder Bal Gupta, Networking, Professor Vaish College of Engg. , rohtak, Haryana.
  4. Er. Ashish goel, Data Communication,Executive, BSNL, Bhiwani Haryana.
  5. Beyda, William J. Data Communications, NJ: Prentice Hall.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details