A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Nalini, L.
- A Comprehensive Approach to Intrusion Detection Alert Correlation
Authors
1 Dept of Computer Science, BMS College for Women, Basavanagudi, Bangalore-04, IN
Source
Adarsh Journal of Information Technology, Vol 2, No 1 (2015), Pagination: 69-71Abstract
Alert correlation is a process that analyzes the alerts produced by one or more intrusion detection systems and provides a more succinct and high-level view of occurring or attempted intrusions.- Networking and Data Security
Authors
1 BMS College for Women, Basavanagudi, Bengaluru-04, IN
Source
Adarsh Journal of Information Technology, Vol 4, No 1 (2016), Pagination: 32-35Abstract
For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially massive problem.
The requirements of information security within an organization have undergone two major changes in the last several decades before the widespread use of data processing equipment, the security of information felt to be valuable to an organization was provided primarily by physical and administrative means. With the introduction of computer the need for automated tools for protecting files and other information stored on the computer became an evident this is especially the case for a shared system, such as time sharing system and the need is even more acute for systems that can be accessed for a public telephone or a data network. The generic name for the collection of tools to protect data and to thwart hackers is "computer security".
Keywords
Authentication, Integrity, Secrecy, Hacker, Non-Repudiation.References
- Network Security: History, Importance, and Future University of Florida Department of Electrical and Computer Engineering Bhavya Daya
- Cisco IBSG, 2011.
- U.S. Census Bureau, 2010; Forrester Research, 2003.
- Wikipedia, 2010. 5. Sources: Cisco IBSG, 2010; U.S. Census Bureau, 2010. 6. While no one can predict the exact number of devices connected to the Internet at any given time, the methodology of applying a constant (Internet doubling in size every 5.32 years) to a generally agreed-upon number of connected devices at a point in time (500 million in 2003) provides an estimate that is appropriate for the purposes of this paper.
- “Planetary Skin: A Global Platform for a New Era of Collaboration,” Juan Carlos Castilla-Rubio and Simon Willis, Cisco IBSG, March2009,http://www.cisco.com/ web/about/ac79/docs/pov/Planetary_Skin _POV_vFINAL_spw _jc_2.pdf
- World Internet Stats: Usage and Population Statistics, June 30, 2010. 9. Sources: Cisco, 2010; HP, 2010.
- ‘Challenges in Management education- A teacher’s perception’published in MSRIM JournalVol.III, Issue 2. July-Dec.2011. international refereed journal 'M S Ramaiah Management Review'