NETWORK SECURITY
2
Author(s):
MS. SUSHILA , MRS. SUNITA
Vol - 5, Issue- 12 ,
Page(s) : 6 - 9
(2014 )
DOI : https://doi.org/10.32804/IRJMST
Abstract
Abstract:- This paper present a review of how to secure our computer network. Today's attacks are succeeding far too frequently, all due to the limitations of legacy security tools. Because many security technologies arose in an earlier era—when attacks targeting sensitive information were fairly straightforward to identify—these tools fail when they cannot recognize a previously unknown attack or threat vector. In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more focused adversary with the resources and capabilities to target highly sensitive information, often through long-term attack campaigns.
- Andrew S. Tanenbaum, Computer networks, Vrije Universiteit, Amsterdam, The Netherlands, PEARSON Prentice Hall.
- Behrouz A. Forouzan, Network security, DeAnza College with Catherine Coombs and Sofia Chung Fegan, McGraw Hill.
- Dr. Satinder Bal Gupta, Networking, Professor Vaish College of Engg. , rohtak, Haryana.
- Er. Ashish goel, Data Communication,Executive, BSNL, Bhiwani Haryana.
- Beyda, William J. Data Communications, NJ: Prentice Hall.
|