Open Access Open Access  Restricted Access Subscription or Fee Access

Network Security

Dr. T. Deepa, R. Malliga, R. Aishwarya

Abstract


For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially.


Keywords


Internet of Thing, Network Connectivity, Spoofing, Social Engineering, Eavesdropping.

Full Text:

PDF

References


https://en.wikipedia.org/wiki/ network_security

https://www.consumer.ftc.gov/articles/0009-computer-security

http://its.ucsc.edu/security/training/intro.html

http://www.contrib.andrew.cmu.edu/~aishah/Sec.html


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.