Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Security and Privacy in Wired, Wireless, Mobile, Hybrid, Sensor and Ad Hoc Networks


Affiliations
1 Department of Computer Science, ADM College for Women, Nagapattinam, India
2 Department of Computer Science/IT, ADM College for Women, Nagapattinam, India
     

   Subscribe/Renew Journal


Cyber security relates to the body of the technologies, processes and practices designed to protect communication networks, computing systems, programs and data from attacks, damage or unauthorized access. The area of cyber security is critical for organization and government across the globe.

It often focuses on the vulnerabilities of commercial off-the-shelf software and internet access, with the primary concern being malicious activity. The cyber security concerns the several security controls to protect the data and Availability. To secure configurations for hardware and software on mobile devices, laptops, workstations, and servers.

The defense activities of the cyber security are designed to enable the smooth and efficient operation of any solution-whether in the public or private sector.

However, cyber security initiatives should not stop at the infrastructure and they must ensure the capabilities of best security practices in developing in the solutions in the different industry sector

This paper examines the increased role of Information Technology (IT) and the growth of the e-commerce sector has made cyber security essential to the economy because each and every country depending upon the economy states. Also cyber security is vital to the operation of safety critical systems, such as emergency response, and to the protection of infrastructure systems, such as the national power grid. Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers.


Keywords

Security, Wired, Wireless, AdHoc Networks, Mobile Networks.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 212

PDF Views: 4




  • Security and Privacy in Wired, Wireless, Mobile, Hybrid, Sensor and Ad Hoc Networks

Abstract Views: 212  |  PDF Views: 4

Authors

M. Faizee Nisha
Department of Computer Science, ADM College for Women, Nagapattinam, India
R. M. Nivedhidha
Department of Computer Science, ADM College for Women, Nagapattinam, India
K. Arul Marie Joycee
Department of Computer Science/IT, ADM College for Women, Nagapattinam, India

Abstract


Cyber security relates to the body of the technologies, processes and practices designed to protect communication networks, computing systems, programs and data from attacks, damage or unauthorized access. The area of cyber security is critical for organization and government across the globe.

It often focuses on the vulnerabilities of commercial off-the-shelf software and internet access, with the primary concern being malicious activity. The cyber security concerns the several security controls to protect the data and Availability. To secure configurations for hardware and software on mobile devices, laptops, workstations, and servers.

The defense activities of the cyber security are designed to enable the smooth and efficient operation of any solution-whether in the public or private sector.

However, cyber security initiatives should not stop at the infrastructure and they must ensure the capabilities of best security practices in developing in the solutions in the different industry sector

This paper examines the increased role of Information Technology (IT) and the growth of the e-commerce sector has made cyber security essential to the economy because each and every country depending upon the economy states. Also cyber security is vital to the operation of safety critical systems, such as emergency response, and to the protection of infrastructure systems, such as the national power grid. Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers.


Keywords


Security, Wired, Wireless, AdHoc Networks, Mobile Networks.