Academic literature on the topic 'Computer networks – Security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks – Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks – Security measures"

1

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
2

NIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.

Full text
Abstract:
This scientific article aims to examine the issue of security in computer networks, highlighting the threats, challenges, and methods of protection. With the development of technology and the increased use of the internet, security in computer networks has become a critical issue for individuals, organizations, and society as a whole. In this article, we will discuss how attackers can infiltrate communication systems and compromise the integrity, confidentiality, and availability of data. The techniques used by attackers to achieve their malicious goals will also be described. Furthermore, the main challenges faced by computer network security specialists will be discussed. These challenges include identifying potential threats, assessing the risk level, developing defense strategies, implementing security policies, and continuous monitoring of network activity. Additionally, legal aspects of network security will be addressed, including current legislation and regulations that impact information security management. In the next section of the article, protective measures to prevent attacks on computer networks will be examined. These measures include implementing strict security policies, utilizing advanced firewall technologies, data encryption, twofactor authentication, and monitoring suspicious events. The role of user education in network security and the need for ongoing awareness of new threats and best security practices will also be discussed. Finally, this article will provide an overview of various studies and research conducted in the field of computer network security. Key findings and recommendations for further development of security in computer networks will be discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
APA, Harvard, Vancouver, ISO, and other styles
4

Mo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Full text
Abstract:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
5

Savytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (December 29, 2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.

Full text
Abstract:
The work is dedicated to the analysis and improvement of methods and tools for building the architecture of software-defined networks (SDNs). A crucial aspect involves comparing the differences between network management using traditional methods and utilizing an SDN controller. Primary attention is given to the development of security models based on software-defined networks.The research is grounded in the analysis of specific cases involving the use of such networks, including gathering opinions and expert assessments from professionals in the field. It leverages publicly available information on methods and tools for securing the architecture of software-defined networks. SDN technology provides greater flexibility and speed in implementing security measures, allowing real-time responses to threats. In contemporary conditions, where cyber threats are becoming more complex and pronounced, SDN networks enable the detection of attacks, blocking malicious actions, and applying security policies in real-time. However, the increasing complexity of cyber threats and constant technological changes necessitate further development and enhancement of the information security of SDN network resources for companies. There is a need for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks. The necessity for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks serves as the foundation for this research. As a result, an enhancement in the level of information security for SDN network resources has been achieved by: 1) reducing the intervention time in the network; 2) applying an improved method of traffic processing based on network security of packet flows, allowing desired network applications to efficiently manage forwarding.
APA, Harvard, Vancouver, ISO, and other styles
6

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.

Full text
Abstract:
Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.
APA, Harvard, Vancouver, ISO, and other styles
10

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Computer networks – Security measures"

1

LU, WEN-PAI. "SECURITY OF COMMUNICATION IN COMPUTER NETWORKS (KEY MANAGEMENT, VERIFICATION)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/183922.

Full text
Abstract:
This dissertation concerns investigations on two of the most important problems in establishing communication security in computer networks: (1) developing a model which precisely describes the mechanism that enforces the security policy and requirements for a secure network, and (2) designing a key management scheme for establishing a secure session for end-to-end encryption between a pair of communicants. The security mechanism attempts to ensure secure flow of information between entities assigned to different security classes in different computer systems attached to a computer communication network. The mechanism also controls the accesses to the network devices by the subjects (users and processes executed on behalf of the users). The communication security problem is formulated by using a mathematical model which precisely describes the security requirements for the network. The model integrates the notions of access control and information flow control to provide a Trusted Network Base (TNB) for the network. The demonstration of security of the network when the security mechanism is designed following the present model is given by using mathematical induction techniques. The problem of designing key management schemes for establishing end-to-end encrypted sessions between source-destination pairs when the source and the destination are on different networks interconnected via Gateways and intermediate networks is examined. In such an internet environment, the key management problem attains a high degree of complexity due to the differences in the key distribution mechanisms used in the constituent networks and the infeasibility of effecting extensive hardware and software changes to the existing networks. A hierarchical approach for key management is presented which utilizes the existing network specific protocols at the lower levels and protocols between Authentication Servers and/or Control Centers of different networks at the higher levels. Details of this approach are discussed for specific illustrative scenarios to demonstrate the implementational simplicity. A formal verification of the security of the resulting system is also conducted by an axiomatic procedure utilizing certain combinatory logic principles. This approach is general and can be used for verifying the security of any existing key management scheme.
APA, Harvard, Vancouver, ISO, and other styles
2

King-Lacroix, Justin. "Securing the 'Internet of Things' : decentralised security for wireless networks of embedded systems." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:b41c942f-5389-4a5b-8bb7-d5fb6a18a3db.

Full text
Abstract:
The phrase 'Internet of Things' refers to the pervasive instrumentation of physical objects with sensors and actuators, and the connection of those sensors and actuators to the Internet. These sensors and actuators are generally based on similar hardware as, and have similar capabilities to, wireless sensor network nodes. However, they operate in a completely different network environment: wireless sensor network nodes all generally belong to a single entity, whereas Internet of Things endpoints can belong to different, even competing, ones. This difference has profound implications for the design of security mechanisms in these environments. Wireless sensor network security is generally focused on defence against attack by external parties. On the Internet of Things, such an insider/outsider distinction is impossible; every entity is both an endpoint for legitimate communications, and a possible source of attack. We argue that that under such conditions, the centralised models that underpin current networking standards and protocols for embedded systems are simply not appropriate, because they require such an insider/outsider distinction. This thesis serves as an exposition in the design of decentralised security mechanisms, applied both to applications, which must perform access control, and networks, which must guarantee communications security. It contains three main contributions. The first is a threat model for Internet of Things networks. The second is BottleCap, a capability-based access control module, and an exemplar of decentralised security architecture at the application layer. The third is StarfishNet, a network-layer protocol for Internet of Things wireless networks, and a similar exemplar of decentralised security architecture at the network layer. Both are evaluated with microbenchmarks on prototype implementations; StarfishNet's association protocol is additionally validated using formal verification in the protocol verification tool Tamarin.
APA, Harvard, Vancouver, ISO, and other styles
3

Bailey, Carmen F. "Analysis of security solutions in large enterprises." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FBailey.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Benbrook, Jimmie Glen 1943. "A SYSTEM ANALYSIS OF A MULTILEVEL SECURE LOCAL AREA NETWORK (COMPUTER)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/275531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Martina, Jean Everson. "Verification of security protocols based on multicast communication." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609650.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kalutarage, H. K. "Effective monitoring of slow suspicious activites on computer networks." Thesis, Coventry University, 2013. http://curve.coventry.ac.uk/open/items/afdbba5c-2c93-41a7-90c3-2f0f3261b794/1.

Full text
Abstract:
Slow and suspicious activities on modern computer networks are increasingly hard to detect. An attacker may take days, weeks or months to complete an attack life cycle. A particular challenge is to monitor for stealthy attempts deliberately designed to stay beneath detection thresholds. This doctoral research presents a theoretical framework for effective monitoring of such activities. The main contribution of this work is a scalable monitoring scheme proposed in a Bayesian framework, which allows for detection of multiple attackers by setting a threshold using the Grubbs’ test. Second contribution is a tracing algorithm for such attacks. Network paths from a victim to its immediate visible hops are mapped and profiled in a Bayesian framework and the highest scored path is prioritised for monitoring. Third contribution explores an approach to minimise data collection by employing traffic sampling. The traffic is sampled using the stratification sampling technique with optimum allocation method. Using a 10% sampling rate was sufficient to detect simulated attackers, and some network parameters affected on sampling error. Final contribution is a target-centric monitoring scheme to detect nodes under attack. Target-centric approach is quicker to detect stealthy attacks and has potential to detect collusion as it completely independent from source information. Experiments are carried out in a simulated environment using the network simulator NS3. Anomalous traffic is generated along with normal traffic within and between networks using a Poisson arrival model. Our work addresses a key problem of network security monitoring: a scalable monitoring scheme for slow and suspicious activities. State size, in terms of a node score, is a small number of nodes in the network and hence storage is feasible for very large networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Full text
Abstract:
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log mining is an evolution of typical digital forensics utilising evidence from network devices such as firewalls, switches and routers. Network log mining is a process supported by presiding South African laws such as the Computer Evidence Act, 57 of 1983; the Electronic Communications and Transactions (ECT) Act, 25 of 2002; and the Electronic Communications Act, 36 of 2005. Nevertheless, international laws and regulations supporting network log mining include the Sarbanes-Oxley Act; the Foreign Corrupt Practices Act (FCPA) and the Bribery Act of the USA. A digital forensic model for computer networks focusing on network log mining has been developed based on the literature reviewed and critical thought. The development of the model followed the Design Science methodology. However, this research project argues that there are some important aspects which are not fully addressed by South African presiding legislation supporting digital forensic investigations. With that in mind, this research project proposes some Forensic Investigation Precautions. These precautions were developed as part of the proposed model. The Diffusion of Innovations (DOI) Theory is the framework underpinning the development of the model and how it can be assimilated into the community. The model was sent to IT experts for validation and this provided the qualitative element and the primary data of this research project. From these experts, this study found out that the proposed model is very unique, very comprehensive and has added new knowledge into the field of Information Technology. Also, a paper was written out of this research project.
APA, Harvard, Vancouver, ISO, and other styles
8

Tyukala, Mkhululi. "Governing information security using organisational information security profiles." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/626.

Full text
Abstract:
The corporate scandals of the last few years have changed the face of information security and its governance. Information security has been elevated to the board of director level due to legislation and corporate governance regulations resulting from the scandals. Now boards of directors have corporate responsibility to ensure that the information assets of an organisation are secure. They are forced to embrace information security and make it part of business strategies. The new support from the board of directors gives information security weight and the voice from the top as well as the financial muscle that other business activities experience. However, as an area that is made up of specialist activities, information security may not easily be comprehended at board level like other business related activities. Yet the board of directors needs to provide oversight of information security. That is, put an information security programme in place to ensure that information is adequately protected. This raises a number of challenges. One of the challenges is how can information security be understood and well informed decisions about it be made at the board level? This dissertation provides a mechanism to present information at board level on how information security is implemented according to the vision of the board of directors. This mechanism is built upon well accepted and documented concepts of information security. The mechanism (termed An Organisational Information Security Profile or OISP) will assist organisations with the initialisation, monitoring, measuring, reporting and reviewing of information security programmes. Ultimately, the OISP will make it possible to know if the information security endeavours of the organisation are effective or not. If the information security programme is found to be ineffective, The OISP will facilitate the pointing out of areas that are ineffective and what caused the ineffectiveness. This dissertation also presents how the effectiveness or ineffctiveness of information security can be presented at board level using well known visualisation methods. Finally the contribution, limits and areas that need more investigation are provided.
APA, Harvard, Vancouver, ISO, and other styles
9

Dong, Ying, and 董穎. "Providing security services for mobile ad hoc networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3955711X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Davis, Carlton R. "Security protocols for mobile ad hoc networks." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=102970.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are generating much interest both in academia and the telecommunication industries. The principal attractions of MANETs are related to the ease with which they can be deployed due to their infrastructure-less and decentralized nature. For example, unlike other wireless networks, MANETs do not require centralized infrastructures such as base stations, and they are arguably more robust due to their avoidance of single point of failures. Interestingly, the attributes that make MANETs attractive as a network paradigm are the same phenomena that compound the challenge of designing adequate security schemes for these innovative networks.
One of the challenging security problems is the issue of certificate revocation in MANETs where there are no on-line access to trusted authorities. In wired network environments, when certificates are to be revoked, certificate authorities (CAs) add the information regarding the certificates in question to certificate revocation lists (CRLs) and post the CRLs on accessible repositories or distribute them to relevant entities. In purely ad hoc networks, there are typically no access to centralized repositories or trusted authorities; therefore the conventional method of certificate revocation is not applicable.
Another challenging MANET security problem is the issue of secure routing in the presence of selfish or adversarial entities which selectively drop packets they agreed to forward; and in so doing these selfish or adversarial entities can disrupt the network traffic and cause various communication problems.
In this thesis, we present two security protocols we developed for addressing the above-mentioned MANET security needs. The first protocol is a decentralized certificate revocation scheme which allows the nodes within a MANET to have full control over the process of certificate revocation. The scheme is fully contained and it does not rely on any input from centralized or external entities such as trusted CAs. The second protocol is a secure MANET routing scheme we named Robust Source Routing (RSR). In addition to providing data origin authentication services and integrity checks, RSR is able to mitigate against intelligent, colluding malicious agents which selectively drop or modify packets they are required to forward.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computer networks – Security measures"

1

John, Mallery, ed. Hardening network security. New York: McGraw-Hill/Osborne, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Teumim, David J. Industrial network security. 2nd ed. Research Triangle Park, NC: ISA, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oram, Andrew. Beautiful Security. Sebastopol, CA: O'Reilly, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hunt, Craig. Network Security. Sebastopol, CA: O’Reilly Media, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bhatnagar, Kartik. Cisco security. Cincinnati, Ohio: Premier Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Horton, Mike. Network security portable reference. New York: McGraw-Hill, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

R, Panko Raymond, ed. Corporate computer security. 3rd ed. Boston: Prentice Hall, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Melissa, Zgola, and Bullaboy Dana, eds. Database security. Boston, Mass: Course Technology/Cengage Learning, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Sudbury, Mass: Jones and Bartlett Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Christmas, Paul. Network security manager. Oxford, England: Elsevier Advanced Technology, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Computer networks – Security measures"

1

Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks, 596–631. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilbur, Steve R., Jon Crowcroft, and Yuko Murayama. "MAC layer security measures in local area networks." In Lecture Notes in Computer Science, 53–65. Berlin, Heidelberg: Springer Berlin Heidelberg, 1989. http://dx.doi.org/10.1007/3-540-51754-5_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stepień, Krzysztof, and Aneta Poniszewska-Marańda. "Towards the Security Measures of the Vehicular Ad-Hoc Networks." In Lecture Notes in Computer Science, 233–48. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05081-8_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Yanjun. "Analysis of Computer Network Management Measures in University Library." In Cyber Security Intelligence and Analytics, 936–40. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97874-7_136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Parwekar, Pritee, and Sparsh Arora. "Security Issues and Its Counter Measures in Mobile Ad Hoc Networks." In ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India- Vol I, 301–9. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-03107-1_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rohilla, Shourya, and Rejo Mathew. "Comparison of Cloud Computing Security Threats and Their Counter Measures." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019), 224–31. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Bin, Long Guo, and Peng Xu. "Computer Network Security and Preventive Measures Based on Big Data Technology." In Advances in Intelligent Systems and Computing, 656–63. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4572-0_94.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wallis, Tania, Greig Paul, and James Irvine. "Organisational Contexts of Energy Cybersecurity." In Computer Security. ESORICS 2021 International Workshops, 384–402. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95484-0_22.

Full text
Abstract:
AbstractThe energy system is going through huge transformation to integrate distributed renewable generation and to achieve the goals of net-zero carbon emissions. This involves a significant adjustment to how the system is controlled and managed, with increasing digitalisation of technology and growing complexities across interconnected systems. Traditionally electricity networks adjusted their supply of energy in response to changes in demand. The future energy system will require more flexible demand to be able to use or store energy when renewables are generating. This change is exacerbated by additional demand for electricity for heat and transport uses.Utility organisations hold responsibility for securing their networks and assuring the supply of electricity. This paper describes a full investigation of cybersecurity issues and concerns for utilities. This industry review was carried out to create a clear organisational context for the ongoing design of cybersecurity improvements. The assessment of potential impact and consequences of cyber-attack is recommended to direct necessary preparations towards protecting essential functions and processes. Improving resilience across interdependent actors is discussed and resilience measures suggested to guide the contributions of different actors towards whole system resilience.
APA, Harvard, Vancouver, ISO, and other styles
9

Zheng, Changliang. "Computer Network Security and Effective Measures for the Era of Big Data." In Application of Big Data, Blockchain, and Internet of Things for Education Informatization, 521–29. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87903-7_64.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Deng, Lei, Haiping Li, and Fanchun Li. "Information Security Risk and Protective Measures of Computer Network in Big Data Age." In Communications in Computer and Information Science, 699–708. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5577-0_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks – Security measures"

1

Zheng, Xiaoxia. "Computer network security and measures." In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Meng, Qingbao. "Computer Network Information Security and Protection Measures." In 2017 7th International Conference on Mechatronics, Computer and Education Informationization (MCEI 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/mcei-17.2017.193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Zhongdong, Liuqiang Wu, and Liangjing Zhang. "A Discussion on Computer Security Technology and Security Preventive Measures." In ICNSER 2022: The 3rd International Conference On Industrial Control Network And System Engineering Research. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3556055.3556063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Enfeng. "On Computer Network Security Management and Technical Measures." In 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016). Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/icence-16.2016.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Peng, Ying. "Analysis of Computer Network Security Problems and Preventive Measures." In 2017 7th International Conference on Mechatronics, Computer and Education Informationization (MCEI 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/mcei-17.2017.72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Yefeng, and Zhengxu Chen. "Preventive Measures of Influencing Factors of Computer Network Security Technology." In 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA). IEEE, 2021. http://dx.doi.org/10.1109/icaica52286.2021.9498242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fang, Chaojun. "Study on security problems and preventive measures of computer network and foreign trade and business." In 3rd International Conference on Green Communications and Networks. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/gcn130101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nikoloska, Svetlana, and Marija Gjosheva. "COMPUTER FORENSIC IN FUNCTION OF CRIMINAL INVESTIGATION." In SECURITY HORIZONS. Faculty of Security- Skopje, 2020. http://dx.doi.org/10.20544/icp.11.01.20.p25.

Full text
Abstract:
Computer forensics is increasingly finding its place in the criminal investigation of criminal offenses in order to shed light on and provide the evidence necessary to initiate criminal proceedings against the perpetrators of crimes that have misused computer technology in criminal activities. Criminal investigation is a procedure of using tactics, techniques and methods aimed at detecting, clarifying and providing evidence through legally prescribed operational-tactical measures and actions, investigative actions and special investigative measures. The Macedonian legislator in the criminal procedural legislation envisages measures and actions for providing electronic evidence which is relevant in computer crimes, but also in specific criminal situations electronic evidence has its meaning in the process of clarification of other classic and economic crimes. This paper analyzes the steps and procedures for extracting, processing and presenting electronic evidence that represent data contained in computer devices, data transmitted through computer systems and networks in order to adapt them to a form acceptable to judicial authorities based on the analysis of all evidence bases the verdicts on the perpetrators who are charged with a specific computer or other crime. An analysis of the actions of the competent investigative and judicial bodies in the process from detection to verdict is made by analyzing reported, accused and convicted perpetrators of the most committed computer crimes, but an analysis will be made for the need of electronic evidence in other crimes through analysis of case. Keywords: Computer forensics, Forensic research, Computer devices, Electronic evidence, Perpetrators of crime.
APA, Harvard, Vancouver, ISO, and other styles
9

Liao, Peng. "Computer Network Information Security Protection Measures Based on AI Intelligent Technology." In ICITEE2020: The 3rd International Conference on Information Technologies and Electrical Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3452940.3453070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lai, Min, and Tao Chen. "Research on Computer Network Information Technology Security and the Preventive Measures." In 2017 4th International Conference on Machinery, Materials and Computer (MACMC 2017). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/macmc-17.2018.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer networks – Security measures"

1

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), February 1989. http://dx.doi.org/10.2172/6137987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Christie, Lorna, and Alison Tully. Security of UK Telecommunications. Parliamentary Office of Science and Technology, August 2018. http://dx.doi.org/10.58248/pn584.

Full text
Abstract:
Telecommunications networks are essential for the day-to-day running of UK businesses and public services, however, concerns have been raised recently over their security. This POSTnote outlines the threats to these networks, the ability of networks to cope with disruption, and possible protective measures.
APA, Harvard, Vancouver, ISO, and other styles
3

Semerikov, Serhiy, Illia Teplytskyi, Yuliia Yechkalo, Oksana Markova, Vladimir Soloviev, and Arnold Kiv. Computer Simulation of Neural Networks Using Spreadsheets: Dr. Anderson, Welcome Back. [б. в.], June 2019. http://dx.doi.org/10.31812/123456789/3178.

Full text
Abstract:
The authors of the given article continue the series presented by the 2018 paper “Computer Simulation of Neural Networks Using Spreadsheets: The Dawn of the Age of Camelot”. This time, they consider mathematical informatics as the basis of higher engineering education fundamentalization. Mathematical informatics deals with smart simulation, information security, long-term data storage and big data management, artificial intelligence systems, etc. The authors suggest studying basic principles of mathematical informatics by applying cloud-oriented means of various levels including those traditionally considered supplementary – spreadsheets. The article considers ways of building neural network models in cloud-oriented spreadsheets, Google Sheets. The model is based on the problem of classifying multi-dimensional data provided in “The Use of Multiple Measurements in Taxonomic Problems” by R. A. Fisher. Edgar Anderson’s role in collecting and preparing the data in the 1920s-1930s is discussed as well as some peculiarities of data selection. There are presented data on the method of multi-dimensional data presentation in the form of an ideograph developed by Anderson and considered one of the first efficient ways of data visualization.
APA, Harvard, Vancouver, ISO, and other styles
4

Mehra, Tanya, and Julie Coleman. The Role of the UN Security Council in Countering Terrorism & Violent Extremism: The Limits of Criminalization? RESOLVE Network, October 2022. http://dx.doi.org/10.37805/sfi2022.4.

Full text
Abstract:
After the 9/11 attacks, a united global community entered an era which saw the proliferation of United Nations entities and organs focused on responding to terrorism. These bodies were created, at least in part, in response to the recognized need for a comprehensive multilateral counter-terrorism architecture to ensure international peace and security in the face of the growing specter of violent extremism. This response has notably also included an array of UN Security Council resolutions (UNSCRs) adopted to counter the threat of terrorism. A little over 20 years after the adoption of Resolution 1373 (2001), 52 terrorism related resolutions now exist, creating an elaborate set of measures for Member States to implement. Despite this, however, terrorism was arguably more prevalent in 2021 than in 2001. A myriad of factors have led to the continued spread of terrorism, including the increasingly transnational nature of terrorists and terrorist networks, as well as the failure to adequately address the structural factors and underlying conditions that are conducive to the spread of violent extremism. In order to explain its persistence, one must not only examine the continued appeal of terrorist groups and violent extremist ideology and propaganda, but also reflect upon where, how, and why counter-terrorism responses have often failed to reduce the threat or, in some cases, even exacerbated the factors which give rise to terrorism in the first place. This includes the response of the Security Council, whose resolutions have created the obligation or expectation for Member States to continuously expand the criminalization of terrorism, without evidence that such an approach will lead to less terrorism. This brief focuses on how some UNSCRs include measures that require Member States to criminalize conduct that has historically fallen within the pre-crime space and lacks a clear link to terrorist activities, and examines the subsequent impact this has on human rights and the effectiveness of the criminal justice system. At the same time, it explores the role that States themselves have played in the exceptionalization of terrorism in terms of criminal justice responses. Finally, it offers recommendations for both the UNSC and Members States on how to ensure that counter-terrorism architecture can both be human-rights based and simultaneously conducive to promoting peace and security.
APA, Harvard, Vancouver, ISO, and other styles
5

Pinson, Lauren. Addressing the Linkages Between Illicit Arms, Organized Crime and Armed Conflict. UNIDIR, September 2022. http://dx.doi.org/10.37559/caap/22/pacav/10.

Full text
Abstract:
Illicit arms and ammunition link conflict to crime as well as crime to conflict. Illicit arms can both enable and fuel an armed conflict, while different conflict phases provide opportunities for the diversion of arms and a potentially lucrative income source for organized arms trafficking networks. To date, there has been limited research examining the linkages between all three of these security challenges. In response to this knowledge gap, this issue brief – produced in collaboration with the United Nations Office on Drugs and Crime (UNODC) – explores the multiple connections between illicit arms, organized crime and armed conflict in relation to (1) the source of illicit arms supply, (2) the process of illicit arms acquisition, and (3) shifts in the dynamics of armed conflict and organized crime. It also provides key considerations to help inform responses to address these interrelated challenges by integrating conventional arms control measures, conflict prevention strategies, and criminal justice responses.
APA, Harvard, Vancouver, ISO, and other styles
6

In Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, March 2022. http://dx.doi.org/10.1061/infographic.000003.

Full text
Abstract:
rsecurity into the current practices of the public water infrastructure sector? ASCE collection on cybersecurity in water distribution networks Overview of smart water networks, their advantages and weaknesses, and growing challenges in securing resilience Lessons learned from past cybersecurity incidents AI-based algorithms for detecting and localizing cyber attacks Integrating cyber attacks into resilience and risk assessment procedures and emergency response measures Analyzing different types of cyber-physical attacks and their effects Modeling and simulation methodologies for managing water distribution security Understanding cybersecurity from the perspective of different stakeholders Cyber attacks will become a more serious and recurring threat the more we transition into smart water distribution systems—we must remain vigilant! This collection will help engineers and decision makers become familiar with the state-of-the-art in cybersecurity for water infrastructure networks, leading to: •Resilient and reliable drinking water infrastructure •Better guidelines and protocols C − In ASCE’s 2021 Report Card for America’s Infrastructure, the Drinking Water category got a ‘C −’ The Infrastructure Investment and Jobs Act supports cybersecurity for the public water system •Clean Water Resiliency and Sustainability Program: Grants to increase resiliency of public treatment systems and distribution networks to cyber attacks and natural hazards •$25 million annually for five years T
APA, Harvard, Vancouver, ISO, and other styles
7

Data Encryption Standard. Gaithersburg, MD: National Institute of Standards and Technology, 1988. http://dx.doi.org/10.6028/nist.fips.46-1.

Full text
Abstract:
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security to its ADP systems. This publication provides a standard to be used by Federal organizations when these organizations specify that cryptographic protection ia to be used for 11emitive or valuable computer data. Protection of computer data during transmission between electronic components or while in storage may be necessary to maintain the confidentiality and integrity of the Information represented by that data. The standard specifies an encryption algorithm which is to be implemented in an el.ectronJc device for use in Federal ADP systems and networks. The algorithm uniquely defines the mathematical steps required to transform computer data into a cryptographic cipher. It also specifies the steps required to transform the cipher back to its original form. A device performing this algorithm may be used in many applications areas where cryptographic data protection is needed. Within the context of a total security program comprising physical security procedures, good information management practices and computer system/network access controls, the Data Encryption Standard is being made available for use by Federal agencies. This revision supersedes FIPS 46.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography