Open Access Open Access  Restricted Access Subscription Access

E-Security


Affiliations
1 Computer Science & Engineering, India
 

Almost everyday we hear that the system run by the government and private organizations have been penetrated or hacked. Even U.S. Military system and Microsoft organization have been hacked or defaced. As we become increasingly reliant upon information technology and communication technology, the exploitation by cyber-criminals poses an ever-greater threat to the public infrastructure.
User
Notifications
Font Size


Abstract Views: 190

PDF Views: 103




  • E-Security

Abstract Views: 190  |  PDF Views: 103

Authors

Mridul Pal
Computer Science & Engineering, India

Abstract


Almost everyday we hear that the system run by the government and private organizations have been penetrated or hacked. Even U.S. Military system and Microsoft organization have been hacked or defaced. As we become increasingly reliant upon information technology and communication technology, the exploitation by cyber-criminals poses an ever-greater threat to the public infrastructure.