A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Malliga, R.
- Network Security
Authors
1 Department of Computer Science, Sri Ramakrishna CAS, Coimbatore, IN
Source
Software Engineering, Vol 9, No 1 (2017), Pagination: 13-16Abstract
For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially.
Keywords
Internet of Thing, Network Connectivity, Spoofing, Social Engineering, Eavesdropping.- Network Security
Authors
1 Department of Computer Science, Sri Ramakrishna CAS, Coimbatore, IN
2 Department of Computer Science, Sri Ramakrishna CAS, Coimbatore, IN
Source
Digital Signal Processing, Vol 9, No 1 (2017), Pagination: 13-16Abstract
For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially.