Open Access Open Access  Restricted Access Subscription Access

Network Security - Catastrophic Risks And Countermeasures


 

Security is crucial to networks and applications. So with the huge explosion of public internet, ecommerce, private computers it has become necessary to secure them properly otherwise they are increasingly vulnerable to malicious attack and various threats. Network structure itself allows many security threats to occur because of many loopholes and improper maintenance. This paper discusses various network threats and proposes their preventive methods which helps in protecting individuals, organisations from intruders and ensures that the information or data travelling on network is safe and protected.


Keywords

Network Security, Spoofing, Spamming, Phishing, Flooding, Trojans, Viruses, Malwares, Honeypots, Packet sniffing, Address Resolution Protocol (ARP), Media Access Control address (MAC) attacks, MAC flooding, Denial of Service (DOS) attacks, Intrusion Detec
User
Notifications
Font Size

Abstract Views: 131

PDF Views: 0




  • Network Security - Catastrophic Risks And Countermeasures

Abstract Views: 131  |  PDF Views: 0

Authors

Abstract


Security is crucial to networks and applications. So with the huge explosion of public internet, ecommerce, private computers it has become necessary to secure them properly otherwise they are increasingly vulnerable to malicious attack and various threats. Network structure itself allows many security threats to occur because of many loopholes and improper maintenance. This paper discusses various network threats and proposes their preventive methods which helps in protecting individuals, organisations from intruders and ensures that the information or data travelling on network is safe and protected.


Keywords


Network Security, Spoofing, Spamming, Phishing, Flooding, Trojans, Viruses, Malwares, Honeypots, Packet sniffing, Address Resolution Protocol (ARP), Media Access Control address (MAC) attacks, MAC flooding, Denial of Service (DOS) attacks, Intrusion Detec