Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Computing the Activity of Connecting Computers in Network Security


Affiliations
1 Department of Computer Application, Vivekanandha Institute of Information and Management Studies, Tiruchengode, Namakkal Dt, Tamilnadu, India
2 Department of Computer Science, Government Arts College (Autonomous), Karur, Tamilnadu, Pincode–639 005, India
     

   Subscribe/Renew Journal


Network security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your network system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications "top secret," you probably do not want strangers reading your email, using your network to attack other systems, sending forged email from your computer, or examining personal information stored on your network.

Keywords

NAT, TCP, UDP, DNS, SSH, POP3, IMAP, SMTP.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 225

PDF Views: 3




  • Computing the Activity of Connecting Computers in Network Security

Abstract Views: 225  |  PDF Views: 3

Authors

K. Sekar
Department of Computer Application, Vivekanandha Institute of Information and Management Studies, Tiruchengode, Namakkal Dt, Tamilnadu, India
K. Thangadurai
Department of Computer Science, Government Arts College (Autonomous), Karur, Tamilnadu, Pincode–639 005, India

Abstract


Network security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your network system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although you may not consider your communications "top secret," you probably do not want strangers reading your email, using your network to attack other systems, sending forged email from your computer, or examining personal information stored on your network.

Keywords


NAT, TCP, UDP, DNS, SSH, POP3, IMAP, SMTP.



DOI: https://doi.org/10.36039/ciitaas%2F3%2F5%2F2011%2F106975.255-259