Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Network Security


Affiliations
1 Department of Computer Science, Sri Ramakrishna CAS, Coimbatore, India
2 Department of Computer Science, Sri Ramakrishna CAS, Coimbatore, India
     

   Subscribe/Renew Journal


For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially.


Keywords

Internet of Thing, Network Connectivity, Spoofing, Social Engineering, Eavesdropping.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 212

PDF Views: 4




  • Network Security

Abstract Views: 212  |  PDF Views: 4

Authors

T. Deepa
Department of Computer Science, Sri Ramakrishna CAS, Coimbatore, India
R. Malliga
Department of Computer Science, Sri Ramakrishna CAS, Coimbatore, India
R. Aishwarya
Department of Computer Science, Sri Ramakrishna CAS, Coimbatore, India

Abstract


For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially.


Keywords


Internet of Thing, Network Connectivity, Spoofing, Social Engineering, Eavesdropping.