Open Access Open Access  Restricted Access Subscription or Fee Access

Network Security threats, Various Attacks and Challenges in Network

Dr. Anil Kumar, Mayank Sharma

Abstract


The System organize innovation is Developing quickly, and the enhancement of web revolution is all the more rapidly, individuals progressively mindful of the Importance of the system security. Network Safety is a major part in the processing and systems administration innovation. Secure Network has now become a need of any affiliation. The security threats are growing bit by bit and making fast wired/remote framework and internet services, precarious and hazardous. It assumes a critical job. In any case, other than fun and accommodation, Computer additionally brings to us a great deal of security chances because of its transparency and availability. The need is additionally instigated in to the territories like protection, where secure and confirmed access of assets are the key issues identified with data security. System surveillance is happening to unbelievable important in view of protected inventive that can be effectively obtained through the web. There are so many attacks that can be when sent over the System. By knowing the assault strategies, takes into consideration the suitable security to develop. Right now, we are attempting to concentrate most various types of attacks alongside various kinds of security move that can be applicable by the need and engineering of the System.


Keywords


Network Security, Attacks, Security Threats, suitable security

Full Text:

PDF

References


Mohan V. Pawar, 2Anuradha J, Network Security and Types of Attacks in Network, International Conference on Intelligent Computing, Communication & Convergence (ICCC-2014) Conference Organized by Interscience Institute of Management and Technology, Bhubaneswar, Odisha, India.

Jie Shan, Analysis and research of computer network security, Journal of Chemical and Pharmaceutical Research, 2014, 6(7):874-877.

Shailja Pandey, Modern Network Security: Issues and Challenges, Shailja Pandey et al./ International Journal of Engineering Science and Technology (IJEST).

Ankalarao Konakalla, 2Bhavani Veeranki, Evolution of Security Attacks and Security Technology, Ankalarao Konakalla et al, International Journal of Computer Science and Mobile Computing Vol.2 Issue. 11, Nov- 2013, pg. 270-276.

Monali S. Gaigole, 2Prof. M. A. Kalyankar, The Study of Network Security with Its Penetrating Attacks and Possible Security Mechanisms, Monali S. Gaigole et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.5, May- 2015, pg. 728-735.

Cyenet. (November 3rd, 2021) Network Attacks and Network Security Threats.[Online] Available from https://www.cynet.com/network-attacks/network-attacks-and-network-security-threats/

Science Direct.(2013) Security Management[Online] Available from https://www.sciencedirect.com/topics/computer-science/security-management


Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Trends in Opto-Electro and Optical Communications