Journal articles on the topic 'Computer networks – Security measures'

To see the other types of publications on this topic, follow the link: Computer networks – Security measures.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer networks – Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
2

NIKLEKAJ, Malvina. "Security in Computer Networks: Threats, Challenges, and Protection." Ingenious 3, no. 1 (2023): 51–60. http://dx.doi.org/10.58944/mcne2043.

Full text
Abstract:
This scientific article aims to examine the issue of security in computer networks, highlighting the threats, challenges, and methods of protection. With the development of technology and the increased use of the internet, security in computer networks has become a critical issue for individuals, organizations, and society as a whole. In this article, we will discuss how attackers can infiltrate communication systems and compromise the integrity, confidentiality, and availability of data. The techniques used by attackers to achieve their malicious goals will also be described. Furthermore, the main challenges faced by computer network security specialists will be discussed. These challenges include identifying potential threats, assessing the risk level, developing defense strategies, implementing security policies, and continuous monitoring of network activity. Additionally, legal aspects of network security will be addressed, including current legislation and regulations that impact information security management. In the next section of the article, protective measures to prevent attacks on computer networks will be examined. These measures include implementing strict security policies, utilizing advanced firewall technologies, data encryption, twofactor authentication, and monitoring suspicious events. The role of user education in network security and the need for ongoing awareness of new threats and best security practices will also be discussed. Finally, this article will provide an overview of various studies and research conducted in the field of computer network security. Key findings and recommendations for further development of security in computer networks will be discussed.
APA, Harvard, Vancouver, ISO, and other styles
3

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
APA, Harvard, Vancouver, ISO, and other styles
4

Mo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Full text
Abstract:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
5

Savytska, Liudmyla, Tetiana Korobeinikova, Ihor Leontiev, and Serhii Bohomolov. "METHODS AND MEANS OF PROTECTING RESOURCES IN COMPUTER SDN NETWORK." Information technology and computer engineering 58, no. 3 (December 29, 2023): 41–52. http://dx.doi.org/10.31649/1999-9941-2023-58-3-41-52.

Full text
Abstract:
The work is dedicated to the analysis and improvement of methods and tools for building the architecture of software-defined networks (SDNs). A crucial aspect involves comparing the differences between network management using traditional methods and utilizing an SDN controller. Primary attention is given to the development of security models based on software-defined networks.The research is grounded in the analysis of specific cases involving the use of such networks, including gathering opinions and expert assessments from professionals in the field. It leverages publicly available information on methods and tools for securing the architecture of software-defined networks. SDN technology provides greater flexibility and speed in implementing security measures, allowing real-time responses to threats. In contemporary conditions, where cyber threats are becoming more complex and pronounced, SDN networks enable the detection of attacks, blocking malicious actions, and applying security policies in real-time. However, the increasing complexity of cyber threats and constant technological changes necessitate further development and enhancement of the information security of SDN network resources for companies. There is a need for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks. The necessity for further analysis and improvement of methods and tools for protecting information and other resources in computer-based SDN networks serves as the foundation for this research. As a result, an enhancement in the level of information security for SDN network resources has been achieved by: 1) reducing the intervention time in the network; 2) applying an improved method of traffic processing based on network security of packet flows, allowing desired network applications to efficiently manage forwarding.
APA, Harvard, Vancouver, ISO, and other styles
6

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.

Full text
Abstract:
Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.
APA, Harvard, Vancouver, ISO, and other styles
10

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Hongqiao. "On Computer Communication Network Security Maintenance Measures." Studies in Social Science Research 4, no. 3 (July 24, 2023): p134. http://dx.doi.org/10.22158/sssr.v4n3p134.

Full text
Abstract:
With the rapid development of China’s science and technology, today’s Internet communication technology has also followed the ever-changing, but there is still a certain network communication information security problems, and this problem is not to be underestimated. Network communication security has a close relationship with national important documents and information protection confidentiality, social security and stability, national development, social and economic development. The use of Internet technology to commit crimes generally does not leave traces of the crime, which increases the chances of using the network to commit crimes.
APA, Harvard, Vancouver, ISO, and other styles
12

Xing, Kongduo. "A Practical Study of Big Data Technology in Computer Network Information Security Processing." Journal of Electronic Research and Application 7, no. 6 (November 29, 2023): 36–41. http://dx.doi.org/10.26689/jera.v7i6.5667.

Full text
Abstract:
In recent years, China has witnessed continuous development and progress in its scientific and technological landscape, with widespread utilization of computer networks. Concurrently, issues related to computer network information security, such as information leakage and virus invasions, have become increasingly prominent. Consequently, there is a pressing need for the implementation of effective network security measures. This paper aims to provide a comprehensive summary and analysis of the challenges associated with computer network information security processing. It delves into the core concepts and characteristics of big data technology, exploring its potential as a solution. The study further scrutinizes the application strategy of big data technology in addressing the aforementioned security issues within computer networks. The insights presented in this paper are intended to serve as a valuable reference for individuals involved in the relevant fields, offering guidance on effective approaches to enhance computer network information security through the application of big data technology.
APA, Harvard, Vancouver, ISO, and other styles
13

Aghaei, John, and Morgan Beren. "An In-Depth Study on Privacy Law, Computer Viruses and Their Prevention." Mathematical Modeling and Algorithm Application 2, no. 1 (May 8, 2024): 20–22. http://dx.doi.org/10.54097/dva59m48.

Full text
Abstract:
With the wide application of computer networks, global informatization is accelerating, computer networks as a platform for information technology and applications have touched all corners of social life, but network viruses have become an important problem plaguing the security of computer systems. This paper initially analyzes the characteristics and hazards of computer network viruses, and puts forward some effective preventive measures, in order to minimize the harm caused by computer viruses.
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.

Full text
Abstract:
Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.
APA, Harvard, Vancouver, ISO, and other styles
15

Slamet, Slamet. "Pelatihan jaringan komputer dan keamanannya bagi dosen dan mahasiswa Dili Institute of Technology (DIT) di Undika Surabaya." TEKMULOGI: Jurnal Pengabdian Masyarakat 3, no. 1 (June 20, 2023): 59–66. http://dx.doi.org/10.17509/tmg.v3i1.58074.

Full text
Abstract:
The Dili Institute of Technology (DIT) is a non-profit, community-based educational organization that focuses on meeting the higher education and vocational training needs of young people, veterans of the resistance, and the children of veterans. It is dedicated to providing general education and training that will help the country become more technically and commercially skilled, creating a workforce that can satisfy the needs of the corporate, public, and community sectors in Timor Leste. Its mission is to provide high-quality education and training based on international standards at undergraduate and postgraduate levels, and in professional training. To prepare students to obtain good qualifications and professions that are adequate to meet constraints, especially those related to network management skills and security measures. Class lecturers and computer laboratory assistants only know the theory of using computers, but lack advanced skills about networks and security to teach students. To deal with this problem, it is necessary to provide understanding and practice to DIT lecturers and students regarding computer networks and their security. The preparation of activities is carried out directly in a participatory manner so that lecturers and students can understand and implement the use of computer networks and their security. The result is training and understanding of network fundamentals for lecturers to transfer their skills to students, while students can deepen their knowledge in the field of networks and security systems. Practical skills in implementing this security using special devices from Cisco and Mikrotik.
APA, Harvard, Vancouver, ISO, and other styles
16

Kuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.

Full text
Abstract:
The terms “kiberushishroeba” (cyber security) and “kiberusaprtkhoeba” (computer security) are often used in inappropriate contexts. The term “kiberushishroeba” is used when the avoidance of an imminent threat requires the formulation and implementation of socio-political measures (development and adoption of doctrines, laws, legal acts, improvement of the “kiberushishroeba” and “kiberusaprtkhoeba” assurance management process), because the state of protection of national interests in cyberspace is achieved through the establishment of an effective Computer Security system, cyberspace sustainability, protection from unwanted internal and external influences – as a result of qualified cyber policy. The starting-point in “kiberushishroeba” providing is political aim and the result – to achieve them. “Kiberusaprtkhoeba” is an integral component of “kiberushishroeba”, a carrier of different content and weight. “Kiberusaprtkhoeba” is a combination of technologies, methods and processes of technical protection against cyberattacks of components (networks, computers, programs, data, devices) within the field of computer and information-telecommunication. It is more associated with protection from "technical" threats (to be taken organizational-technical measures: to identify those responsible for the operation safety of the computerinformation-telecommunication field and to introduce appropriate technical infrastructure and security system) or rather to “protection of labor safety” than formulation and implementation of socio-political goals. The goal of “kiberusaprtkhoeba” is to protect them, and to achieve this protection as a whole is ensuring of the result that meets the requirements of the political goal of “kiberushishroeba”.
APA, Harvard, Vancouver, ISO, and other styles
17

Kumar, Indrajeet. "Machine Learning for Network Security: An Analysis of Intrusion Detection Systems." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 2 (September 10, 2019): 1075–80. http://dx.doi.org/10.17762/turcomat.v10i2.13628.

Full text
Abstract:
Due to the increasing importance of data and communication over computer networks, securing the network has become a critical issue. One of the most common factors that attackers use to bypass security measures is the availability of Intrusion Detection System (IDS) techniques. This paper aims to introduce machine learning to help improve the capabilities of IDS. The paper explores the potential of machine learning to enhance the security of networks. It starts by introducing network security and IDS, and then it reviews the current limitations of IDS techniques. It then delves into the world of machine learning and its applications in IDS. The paper presents an overview of the various aspects of machine learning-based IDS, including the datasets used for analysis, the models used, and the evaluation metrics that were utilized to measure their effectiveness. It then compares the results with traditional IDS techniques, and it explores the potential of this technology for future research. According to the findings of the study, machine learning-based intrusion detection systems can provide an efficient and accurate method of detecting unauthorized access to a computer network. The paper concludes by discussing the technology's potential for securing networks.
APA, Harvard, Vancouver, ISO, and other styles
18

Safavi-Naini, Reihaneh, Alireza Poostindouz, and Viliam Lisy. "Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication." Security and Communication Networks 2018 (May 7, 2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.

Full text
Abstract:
Moving target defense (MTD) strategies have been widely studied for securing computer systems. We consider using MTD strategies to provide long-term cryptographic security for message transmission against an eavesdropping adversary who has access to a quantum computer. In such a setting, today’s widely used cryptographic systems including Diffie-Hellman key agreement protocol and RSA cryptosystem will be insecure and alternative solutions are needed. We will use a physical assumption, existence of multiple communication paths between the sender and the receiver, as the basis of security, and propose a cryptographic system that uses this assumption and an MTD strategy to guarantee efficient long-term information theoretic security even when only a single path is not eavesdropped. Following the approach of Maleki et al., we model the system using a Markov chain, derive its transition probabilities, propose two security measures, and prove results that show how to calculate these measures using transition probabilities. We define two types of attackers that we call risk-taking and risk-averse and compute our proposed measures for the two types of adversaries for a concrete MTD strategy. We will use numerical analysis to study tradeoffs between system parameters, discuss our results, and propose directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhu, Qingyi, Yuhang Liu, Xuhang Luo, and Kefei Cheng. "A Malware Propagation Model Considering Conformity Psychology in Social Networks." Axioms 11, no. 11 (November 10, 2022): 632. http://dx.doi.org/10.3390/axioms11110632.

Full text
Abstract:
At present, malware is still a major security threat to computer networks. However, only a fraction of users with some security consciousness take security measures to protect computers on their own initiative, and others who know the current situation through social networks usually follow suit. This phenomenon is referred to as conformity psychology. It is obvious that more users will take countermeasures to prevent computers from being infected if the malware spreads to a certain extent. This paper proposes a deterministic nonlinear SEIQR propagation model to investigate the impact of conformity psychology on malware propagation. Both the local and global stabilities of malware-free equilibrium are proven while the existence and local stability of endemic equilibrium is proven by using the central manifold theory. Additionally, some numerical examples and simulation experiments based on two network datasets are performed to verify the theoretical analysis results. Finally, the sensitivity analysis of system parameters is carried out.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Ke. "A wormhole attack detection method for tactical wireless sensor networks." PeerJ Computer Science 9 (August 29, 2023): e1449. http://dx.doi.org/10.7717/peerj-cs.1449.

Full text
Abstract:
Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology. WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. As one of the more severe threats, wormholes create passive attacks that are hard to detect and eliminate. Since WSN is often used in the tactical network field, a planned secure network is essential for military applications with high security. Guard nodes are traffic monitoring nodes used to supervise neighbors’ data communication around the tactical networks. Therefore, this work proposes a Quality of Service (QoS) security mechanism to select multiple dual-layer guard nodes at different paths of the WSN based on the path qualities to detect wormholes. The entire network’s links are categorized into high, normal, and low priority levels. As such, this study aimed to confirm the security of high priority nodes and links in the tactical network, avoid excessive overhead, and provide random security facilities to all nodes. The proposed measures of the QoS-based security provision, including link cluster formation, guard node selection, authenticated guard node identification, and intrusion detection, ensure economic and efficient network communication with different quality levels.
APA, Harvard, Vancouver, ISO, and other styles
21

Yang, Wenfu. "Research on Computer Information Network Security Technology and Security Precaution Measures Based on Computer." Journal of Physics: Conference Series 1744, no. 4 (February 1, 2021): 042008. http://dx.doi.org/10.1088/1742-6596/1744/4/042008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Кобцев, О. Е., А. И. Шеншин, В. М. Питолин, Л. В. Паринова, Ю. Г. Пастернак, and Ю. В. Макаров. "NETWORK ATTACKS BY COMPUTER VIRUSES: SPECIFIC INFORMATION SECURITY POLICY." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 27, no. 1(-) (March 29, 2024): 67–80. http://dx.doi.org/10.36622/1682-7813.2024.27.1.004.

Full text
Abstract:
Данная научная статья посвящена исследованию сетевых атак, осуществляемых компьютерными вирусами на корпоративные сети, в частности – разработке комплекса мер по обеспечению информационной безопасности предприятия. В ходе исследования, на основе информации о сценариях (векторах) сетевых атак компьютерными вирусами, разработана частная политика и регламенты обеспечения информационной безопасности предприятия. Результаты исследования представляют собой значимый вклад в области обеспечения информационной безопасности предприятий, адаптированы для практического использования, а также могут служить основой для дальнейшей разработки мер по защите от сетевых атак компьютерными вирусами. This scientific article is dedicated to the study of network attacks carried out by computer viruses on corporate networks, specifically focusing on the development of a set of measures to ensure the information security of the enterprise. During the research, based on information about scenarios (vectors) of network attacks by computer viruses, a specific policy and regulations for ensuring the information security of the enterprise were developed. The research results represent a significant contribution to the field of ensuring the information security of enterprises, are adapted for practical use, and can serve as a basis for further development of measures to protect against network attacks by computer viruses.
APA, Harvard, Vancouver, ISO, and other styles
23

Feng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.

Full text
Abstract:
Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In this paper, an optimal control measure is proposed based on the SEIR virus propagation model in point-to-group information networks. First, considering the need for antivirus measures in reality, an optimal control problem is introduced, and then a controlled computer virus spread model in point-to-group information networks is established. Second, the optimal control measure is formulated by making a tradeoff between control cost and network loss caused by virus intrusion. Third, optimal control strategies are theoretically investigated by Pontryagin’s maximum principle and the Hamiltonian function. Finally, through numerical simulations, effective measures for controlling virus spread in point-to-group information networks are proposed.
APA, Harvard, Vancouver, ISO, and other styles
24

Smith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (July 1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (March 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Dr. Kashyap C. Patel, Dr. Sachin A. Goswami, Dr. Saurabh A. Dave, and Ajaykumar Patel. "Crippling Connectivity : Unveiling the Network Disruption Potential of Vehicular Rogue Access Points." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 3 (June 24, 2024): 632–43. http://dx.doi.org/10.32628/cseit241036.

Full text
Abstract:
Vehicular Networks have transformed modern transportation by facilitating communication between vehicles (V2V) and between vehicles and infrastructure (V2I). Nevertheless, this technical progress brings forth new security risks, including Vehicular Rogue Access Points (VRAPs), which have the potential to disrupt network connectivity and jeopardize the integrity of vehicular networks. This research investigates the menace presented by VRAPs, analyzing their capacity to cause significant disruptions to computer networks. We conduct a thorough analysis to emphasize the methods by which VRAPs can be utilized, the many types of assaults they can enable, and the subsequent consequences for the security of vehicular networks. The results of our research highlight the immediate requirement for strong security measures to protect vehicular network from these types of risks.
APA, Harvard, Vancouver, ISO, and other styles
27

Zhou, Zhengchun, and Wenyao Shen. "HoneyPot : Enhancing Cybersecurity through a computer simulation technology." Highlights in Science, Engineering and Technology 105 (June 30, 2024): 97–101. http://dx.doi.org/10.54097/0q8h9k30.

Full text
Abstract:
Honeypot technology is essentially a technique of deceiving attackers by deploying hosts, network services, or information as bait to lure them into attacking. This allows for the capture and analysis of attack behavior, speculating on attack intentions and motivations, enabling the defense to have a clear understanding of the security threats they face, and enhancing the security protection capabilities of the actual system through technical and management measures. A honeypot is like an intelligence gathering system. It is also possible to eavesdrop on the connections between hackers, collect various tools used by hackers, and gain control of their social networks.
APA, Harvard, Vancouver, ISO, and other styles
28

Sheikh, Yelena Mujibur, and Yash B. Dobhal. "Cybersecurity and Web of Things: A review on Ad hoc issues." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1–9. http://dx.doi.org/10.22214/ijraset.2022.40529.

Full text
Abstract:
Abstract: Cyber Security is employed for shielding knowledge systems like networks, computers, databases, information centers, and applications with acceptable procedural and technical security measures. As most of the issues pop up the thoughts, ‘cybercrimes’ can mix colossally daily. Crime is rising as a grave threat in today’s world. It’s an aggressive space of crime. As the number of web users has grown, so has offense. For example, the current Covid-19 pandemic has had a notable consequence for organizations and establishments, resulting in security vulnerabilities; as a result, network security is becoming progressively diverse and complex, and as a matter of fact, completely different ways are being devised to exploit it. Network engineers got to sustain with recent advances in each hardware and software package field to forestall them from being employed, together with user information. Historically, solely mobile computers and phones were connected to the internet; however, with the advancement of technology, other items such as security cameras, microwaves, automobiles, and industrial machinery are all now connected to the internet. The web of stuff is the term given to this network of interconnected things. Prime Securities for the Web of Things are involved[1]. This paper gives detailed information on cyber security and crime as little more than a result. It addresses forms of cyber security, the need for cyber security, issues regarding cyber security, benefits and drawbacks, criminal background, and criminal offenses. Keywords: Computer Security, Internet, Protection, Application software, IP network, Exploits, Malware Threats, Virus, IoT, Network Security, Computer Network, Cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
29

Alisultanova, Iman A., Galina A. Ovseenko, and Bella Kh Visaitova. "ANALYSIS OF NETWORK INFORMATION SECURITY STRATEGIES IN HIGHER EDUCATION INSTITUTIONS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 5/5, no. 146 (2024): 30–35. http://dx.doi.org/10.36871/ek.up.p.r.2024.05.05.005.

Full text
Abstract:
With the advent of the Internet era, computer networks have become widespread in the field of education. Since the management of network information security is of great importance for the development of higher education, large educational institutions should be aware of the importance of managing network information security. The purpose of the article is to solve the main problems faced by the management of network information security, and to take appropriate measures to lay a solid foundation for building a secure Internet environment.
APA, Harvard, Vancouver, ISO, and other styles
30

Jiang, Jianfeng. "Computer Network Security Threats and Treatment Measures Based on Host Security Protection." Journal of Physics: Conference Series 1992, no. 3 (August 1, 2021): 032049. http://dx.doi.org/10.1088/1742-6596/1992/3/032049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Shi, Zi-xin. "Research on Computer Security Guarantee Measures in Network Environment." Journal of Physics: Conference Series 1550 (May 2020): 022033. http://dx.doi.org/10.1088/1742-6596/1550/2/022033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Кобцев, О. Е., А. И. Шеншин, В. М. Питолин, В. И. Белоножкин, К. А. Разинкин, and А. С. Кривошеин. "NETWORK ATTACKS BY COMPUTER VIRUSES: SPECIFIC INFORMATION SECURITY INSTRUCTIONS." ИНФОРМАЦИЯ И БЕЗОПАСНОСТЬ 27, no. 1(-) (March 29, 2024): 81–90. http://dx.doi.org/10.36622/1682-7813.2024.27.1.005.

Full text
Abstract:
Данная научная статья посвящена исследованию сетевых атак, осуществляемых компьютерными вирусами на корпоративные сети, в частности – разработке конкретных инструкций и рекомендаций по защите, адаптированных к практическому применению. В ходе исследования, на основе информации о сценариях (векторах) сетевых атак компьютерными вирусами, разработаны частные инструкции обеспечения информационной безопасности предприятия. Результаты исследования представляют собой вклад в обеспечение информационной безопасности предприятий, адаптированы для практического использования, а также могут служить основой для дальнейшей разработки мер по защите от сетевых атак компьютерными вирусами. This scientific article is dedicated to the study of network attacks carried out by computer viruses on corporate networks, specifically focusing on the development of specific guidelines and recommendations for protection, adapted for practical use. During the research, based on information about scenarios (vectors) of network attacks by computer viruses, specific instructions for ensuring the information security of the enterprise were developed. The research results represent a contribution to ensuring the information security of enterprises, are adapted for practical use, and can serve as a basis for further development of measures to protect against network attacks by computer viruses.
APA, Harvard, Vancouver, ISO, and other styles
33

Dong, Ya Hui, Wei Li, and Xu Wen Guo. "Analysis on Network Security and Solution of Computer." Advanced Materials Research 219-220 (March 2011): 1305–8. http://dx.doi.org/10.4028/www.scientific.net/amr.219-220.1305.

Full text
Abstract:
Currently, the issue of computer network security becomes more and more serious. This thesis takes the main factors that affect the computer network security as the breakthrough, and pays attention to the analysis and prevention of various measures that are not conducive to the normal operation of computer network. It also fully discusses the situations that affect the computer network security from different perspectives in order to take preventive measures, remove adverse factors in the embryonic stage and ensure the security management and effective operation of computer network. This thesis proposes solutions from seven aspects, namely security and encryption technology, firewall technology, network address translator technology, security kernel technology of operating system, technology of anti virus in computer network, network backup system and security management.
APA, Harvard, Vancouver, ISO, and other styles
34

Hider, Nuria Mohamed. "Analysis of the Main Problems in Computer Network Security and Some Suggestions and Measures to Prevent Them." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1183–86. http://dx.doi.org/10.22214/ijraset.2022.40821.

Full text
Abstract:
Abstract: With the rapid development and application of the computer network technology, computer network system has brought many unsafe hidden dangers to the user. The computer network security has got more and more attentions of people. Therefore, this paper analyzes the main problems in computer network security and proposes some effective preventive measures. The author hopes these will help the computer network plays better role for people. Keywords: Computer Network Security, Computer Virus, Confidentiality, Preventive Measures.
APA, Harvard, Vancouver, ISO, and other styles
35

Sun, Xiao Ru. "Research on the Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2007–10. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2007.

Full text
Abstract:
With the rapid development and application of the computer network technology, computer network system has brought many unsafe hidden dangers to the user. The computer network security has got more and more attentions of people. Therefore, this paper analyzes the main problems in computer network security and proposes some effective preventive measures. The author hopes these will help the computer network plays better role for people.
APA, Harvard, Vancouver, ISO, and other styles
36

Heinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.

Full text
Abstract:
Securing a safety-critical system is a challenging task, because safety requirements have to be considered alongside security controls. We report on our experience to develop a security architecture for railway signalling systems starting from the bare safety-critical system that requires protection. We use a threat-based approach to determine security risk acceptance criteria and derive security requirements. We discuss the executed process and make suggestions for improvements. Based on the security requirements, we develop a security architecture. The architecture is based on a hardware platform that provides the resources required for safety as well as security applications and is able to run these applications of mixed-criticality (safety-critical applications and other applications run on the same device). To achieve this, we apply the MILS approach, a separation-based high-assurance security architecture to simplify the safety case and security case of our approach. We describe the assurance requirements of the separation kernel subcomponent, which represents the key component of the MILS architecture. We further discuss the security measures of our architecture that are included to protect the safety-critical application from cyberattacks.
APA, Harvard, Vancouver, ISO, and other styles
37

Baranenko, R. "Cyber crime, computer crime or cyber offense? The analysis of the features of a terminology application." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(49) (June 8, 2021): 85–90. http://dx.doi.org/10.20535/2308-5053.2021.1(49).233023.

Full text
Abstract:
Today cybercrime and computer terrorism are identified as one of the threats to Ukraine’s national security in the information sphere. Cybersecurity measures include achieving and maintaining security features in the resources of an institution or users, aimed at preventing relevant cyber threats. Cybercrime is a set of criminal offenses committed in cyberspace by computer systems or by using computer networks and other means of access to cyberspace, within computer systems or networks, as well as against computer systems, computer networks and computer data, has been widely developed. The paper considers such terms as «computer crime», «information crime», «crime in the field of computer information», «crimes in the field of information technology». Scientific works of domestic and foreign researchers on the issues of countering cybercrime are analyzed. The connection of the concept of «cybersecurity» with the terms «cybercrime», «computer crime» and «cybercrime» the concepts of «cybercrime» was given. The difference in the interpretation of the concepts «cybersecurity» and «information security» was considered. The definitions of «cybercrime», «computer crime» and «cyber offense» were given for comparison. Their main features were considered. The concept of «computer victimhood» and its components were considered. With the introduction of the institute of criminal offenses in the national criminal law, the terms «cybercrime» and «computer crime» should lose their relevance, as evidenced by the change of title of Chapter XVI of the Criminal Code of Ukraine to «Criminal offenses in the use of electronic computing machines (computers), systems and computer networks and telecommunications networks». Therefore, instead, we can recommend the use of the term «cyber offense», which we propose to understand as «socially dangerous criminal act in cyberspace and/or using it, liability for which is provided by the law of Ukraine on criminal liability and/or which is recognized as a criminal offense by international treaties of Ukraine, and cybercrime is a set of cyber offences». It is clear that this will require the introduction of appropriate terminological changes in the Law of Ukraine «On the Basic Principles of Cyber Security of Ukraine» and other regulations.
APA, Harvard, Vancouver, ISO, and other styles
38

Sun, Ning Ning, and Li Hua Ma. "Research and Maintenance of Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2431–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2431.

Full text
Abstract:
This paper of University Library in the computer network security situation analysis, proposed the threat factors of current university library computer network security faces, proposed the university library computer software maintenance and maintenance measures to ensure the safety of computer network application system in the library.
APA, Harvard, Vancouver, ISO, and other styles
39

Alfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (November 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Badzeliuk, P. "On the issue of cybersecurity of advocacy activity." Analytical and Comparative Jurisprudence, no. 2 (July 24, 2022): 302–5. http://dx.doi.org/10.24144/2788-6018.2022.02.56.

Full text
Abstract:
During the 20th century, technological progress rewarded the convergence of telecommunications and computer technology. This marked the beginning of an era known as the information age. The information age is characterized by the growth of digitalization, which mainly performs the technological transition from analog and electromechanical technologies to digital technologies. A very characteristic feature of the information age is the continuous integration of computer and digital communication technologies into virtually every aspect of life. This has led to the emergence of the information society, which has fundamentally changed traditional perceptions of security. The security of digital data, computers, digital communications technologies and information networks now has a predominant impact on all aspects of life and society. Thus, with the advent of the information society, malicious actions against information systems, such as computer systems and networks, can now affect individuals, the country and the global economy in a way that was previously unheard of. Measures to address these information security issues have given rise to a new concept known as «cybersecurity». Cybersecurity of information is aimed at promoting and ensuring the overall security of digital and information systems with the security of the information society. Thus, the concept of a wide range of social, legal, regulatory and technological measures that ensure the integrity, confidentiality, accessibility and overall security of digital information and information systems to achieve the high level of trust and security necessary for the development of a sustainable information society. Advocacy is inextricably linked to confidential information. Providing protection and security of information about one of the best tasks of advocacy. The age of digitization of advocacy is transforming the usual procedural agenda. This creates a new mystery for lawyers. In a profession where trust and confidentiality are as sacred as keeping clients secret, is the amount of information that comes to your attention increasingly beyond your control?
APA, Harvard, Vancouver, ISO, and other styles
41

Wang, Jian Hang, and Hai Bo Wang. "Computer Local Area Network Security and Management." Advanced Materials Research 1079-1080 (December 2014): 595–97. http://dx.doi.org/10.4028/www.scientific.net/amr.1079-1080.595.

Full text
Abstract:
Development of computer network technology has greatly improved the sharing rate and utilization of information resources, many areas are widely used local area network, widely used degree gradually expose their security and confidentiality issues. In particular, people lack knowledge on security policy and network security control mechanisms, leading network security becomes more complex. In this paper, the main problem with the current computer Local Area Network security and the starting point, the focus of the analysis and management of their security and confidentiality measures, hope to further enhance the computer LAN security.
APA, Harvard, Vancouver, ISO, and other styles
42

Labinsky, Alexander. "ON THE ISSUE OF NETWORK SECURITY." NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS) 2024, no. 2 (July 13, 2024): 39–46. http://dx.doi.org/10.61260/2307-7476-2024-2-39-46.

Full text
Abstract:
The following are considered:  principles and means of ensuring the security of a corporate network, as well as features of virtual private networks that provide reliable protection and secure data transmission;  principles and measures to ensure the security of the corporate network, as well as the types of information protection provided by these security measures;  virtual private networks (VPNs) that provide a secure encrypted user connection to the network. Using a VPN provides reliable data protection, masking the user's geolocation, access to regional content and secure data transfer;  systems for detecting and preventing network hacking threats, among which the main focus is on the Kali Linux software package, as well as features of the Windows subsystem for Linux and Windows network monitoring tools;  Windows network monitoring tools, including utilities that work in console command-line mode and allow you to check the availability of remote personal computers and diagnose the connection. The Kali Linux software package is a distribution package for the Linux operating system that has more than 600 preinstalled network penetration testing programs. Among the features of the package, the article discusses the search and exploitation of network vulnerabilities, checking the correct configuration of the SSL certificate and open ports, tracing the data transfer route, checking the availability of servers and searching for network problems.
APA, Harvard, Vancouver, ISO, and other styles
43

Dolente, Filippo, Rosario Giuseppe Garroppo, and Michele Pagano. "A Vulnerability Assessment of Open-Source Implementations of Fifth-Generation Core Network Functions." Future Internet 16, no. 1 (December 19, 2023): 1. http://dx.doi.org/10.3390/fi16010001.

Full text
Abstract:
The paper presents an experimental security assessment within two widely used open-source 5G projects, namely Open5GS and OAI (Open-Air Interface). The examination concentrates on two network functions (NFs) that are externally exposed within the core network architecture, i.e., the Access and Mobility Management Function (AMF) and the Network Repository Function/Network Exposure Function (NRF/NEF) of the Service-Based Architecture (SBA). Focusing on the Service-Based Interface (SBI) of these exposed NFs, the analysis not only identifies potential security gaps but also underscores the crucial role of Mobile Network Operators (MNOs) in implementing robust security measures. Furthermore, given the shift towards Network Function Virtualization (NFV), this paper emphasizes the importance of secure development practices to enhance the integrity of 5G network functions. In essence, this paper underscores the significance of scrutinizing security vulnerabilities in open-source 5G projects, particularly within the core network’s SBI and externally exposed NFs. The research outcomes provide valuable insights for MNOs, enabling them to establish effective security measures and promote secure development practices to safeguard the integrity of 5G network functions. Additionally, the empirical investigation aids in identifying potential vulnerabilities in open-source 5G projects, paving the way for future enhancements and standard releases.
APA, Harvard, Vancouver, ISO, and other styles
44

Sun, Xiu Juan. "Personal Computer Network Security Prevention Research." Advanced Materials Research 971-973 (June 2014): 1684–87. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1684.

Full text
Abstract:
this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.
APA, Harvard, Vancouver, ISO, and other styles
45

Ibaisi, Thaer AL, Stefan Kuhn, Mustafa Kaiiali, and Muhammad Kazim. "Network Intrusion Detection Based on Amino Acid Sequence Structure Using Machine Learning." Electronics 12, no. 20 (October 17, 2023): 4294. http://dx.doi.org/10.3390/electronics12204294.

Full text
Abstract:
The detection of intrusions in computer networks, known as Network-Intrusion-Detection Systems (NIDSs), is a critical field in network security. Researchers have explored various methods to design NIDSs with improved accuracy, prevention measures, and faster anomaly identification. Safeguarding computer systems by quickly identifying external intruders is crucial for seamless business continuity and data protection. Recently, bioinformatics techniques have been adopted in NIDSs’ design, enhancing their capabilities and strengthening network security. Moreover, researchers in computer science have found inspiration in molecular biology’s survival mechanisms. These nature-designed mechanisms offer promising solutions for network security challenges, outperforming traditional techniques and leading to better results. Integrating these nature-inspired approaches not only enriches computer science, but also enhances network security by leveraging the wisdom of nature’s evolution. As a result, we have proposed a novel Amino-acid-encoding mechanism that is bio-inspired, utilizing essential Amino acids to encode network transactions and generate structural properties from Amino acid sequences. This mechanism offers advantages over other methods in the literature by preserving the original data relationships, achieving high accuracy of up to 99%, transforming original features into a fixed number of numerical features using bio-inspired mechanisms, and employing deep machine learning methods to generate a trained model capable of efficiently detecting network attack transactions in real-time.
APA, Harvard, Vancouver, ISO, and other styles
46

Kocharla, Laxmaiah, and B. Veeramallu. "Secure Energy-Efficient Load Balancing and Routing in Wireless Sensor Networks With Mediative Micro-ANN Fuzzy Logic." International Journal of Fuzzy System Applications 11, no. 3 (July 1, 2022): 1–16. http://dx.doi.org/10.4018/ijfsa.306277.

Full text
Abstract:
The security and life time of network are most import factors in wireless sensor networks (WSN). In this research work Mediative Micro ANN Fuzzy logic(MMAFL) has been proposed, along with load-balance routing algorithm. The designed method can increase WSN’s additional feature like securing packet from message capture and tampering attacks. The aim of the proposed routing algorithm is reduce the overall energy consumption and ensure fair use of node energy, so that lifetime of the network has been automatically increased. Experimentation of the proposed Mediative Micro ANN Fuzzy logic is implemented in MATLAB 2018b software and compared with the existing techniques to prove the effectiveness of the approach. The MMAFL model is most useful for medical, Mobile, and industrial applications for data transferring and network security. The performance measures like accuracy 97.45%, F measure 97.34%, overhead 11.10%, delay 8.96ms, throughput 90%, lifetime 27%, and packet-delivery ration 86.11% had been attained, which are most prominent compared to earlier models.
APA, Harvard, Vancouver, ISO, and other styles
47

Wei Jia, Cuiping Shi, Xuan Zhou,. "Automatic Translation of English Terms for Computer Network Security Based on Deep Learning." Journal of Electrical Systems 20, no. 3s (April 4, 2024): 598–609. http://dx.doi.org/10.52783/jes.1335.

Full text
Abstract:
Translation computer network security refers to the protection of sensitive information during the transmission of data across networks in different languages. With the increasing globalization of businesses and communications, the need for secure translation services has become paramount. Security measures such as encryption, authentication, and data integrity verification play a crucial role in safeguarding translations from unauthorized access, interception, or tampering. Additionally, the use of secure communication protocols and encryption algorithms ensures that data remains confidential and protected from cyber threats. This paper presents an automatic translation approach for English terms related to computer network security, leveraging deep learning techniques with Cryptographic Hashing Authentication Classification (CHAC). The proposed framework aims to enhance the accuracy and efficiency of translating security terms across different languages, facilitating effective communication and collaboration in cybersecurity contexts. Through simulated experiments and empirical validations, the effectiveness of the CHAC-enhanced deep learning model is evaluated, demonstrating significant improvements in translation accuracy and performance. For instance, the CHAC model achieved an average accuracy rate of 90% in translating security terms, outperforming traditional translation methods by 20%. Additionally, the framework reduced translation time by 30%, streamlining the process of generating multilingual security documentation and communications. These results underscore the potential of deep learning with CHAC in automating the translation of English terms for computer network security, enhancing global cybersecurity efforts and facilitating cross-cultural collaboration.
APA, Harvard, Vancouver, ISO, and other styles
48

Dong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.

Full text
Abstract:
With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.
APA, Harvard, Vancouver, ISO, and other styles
49

Yang, Xiao Hong, and Yue Feng Chen. "A Study of Vulnerability Detection and Prevention on Computer Network Security." Applied Mechanics and Materials 321-324 (June 2013): 2630–34. http://dx.doi.org/10.4028/www.scientific.net/amm.321-324.2630.

Full text
Abstract:
With the rapid development of computer and network technology, the security of computer network becomes the most important issue. For the computer network, it not only takes convenience to us, but also takes troubles, such as network security, virus, cockhorse etc.. In this article, we analyse the cause of the security,and then introduce a number of measures of vulnerability detection and protection on computer network security.
APA, Harvard, Vancouver, ISO, and other styles
50

VASILE, Cristinel Marius. "Firewall Technologies." International Journal of Information Security and Cybercrime 7, no. 1 (June 29, 2018): 37–44. http://dx.doi.org/10.19107/ijisc.2018.01.04.

Full text
Abstract:
Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography