Open Access   Article Go Back

Security Technology

A.J. Zaru1

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-12 , Page no. 98-103, Dec-2016

Online published on Jan 02, 2016

Copyright © A.J. Zaru . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A.J. Zaru, “Security Technology,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.98-103, 2016.

MLA Style Citation: A.J. Zaru "Security Technology." International Journal of Computer Sciences and Engineering 4.12 (2016): 98-103.

APA Style Citation: A.J. Zaru, (2016). Security Technology. International Journal of Computer Sciences and Engineering, 4(12), 98-103.

BibTex Style Citation:
@article{Zaru_2016,
author = {A.J. Zaru},
title = {Security Technology},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2016},
volume = {4},
Issue = {12},
month = {12},
year = {2016},
issn = {2347-2693},
pages = {98-103},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1140},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1140
TI - Security Technology
T2 - International Journal of Computer Sciences and Engineering
AU - A.J. Zaru
PY - 2016
DA - 2017/01/02
PB - IJCSE, Indore, INDIA
SP - 98-103
IS - 12
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1494 1309 downloads 1279 downloads
  
  
           

Abstract

All input is evil until proven otherwise!‖�so security technology come into play.With the rapid growth of interest in the Internet, network security has become a major concern to companies throughout the world. The fact that the information and tools needed to penetrate the security of corporate networks are widely available has increased that concern. Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. Tools that probe for system vulnerabilities, such as the Security Administrator Tool for Analyzing Networks (SATAN), and some of the newly available scanning and intrusion detection packages and appliances, assist in these efforts, but these tools only point out areas of weakness and may not provide a means to protect networks from all possible attacks. Thus, as a network administrator, you must constantly try to keep abreast of the large number of security issues confronting you in today`s world. This paper describes many of the security issues that arise when connecting a private network. Understand the types of attacks that may be used by hackers to undermine network security. For decades, technology has transformed almost every aspect of business, from the shop floor to the shop door. While technology was a fundamental enabler, it was often driven from an operational or cost advantage and seen as separate from business itself. The new reality is that technology doesn�t support the business�technology powers the business. IT risks are now business risks and IT opportunities are now business opportunities.

Key-Words / Index Term

Security, Fires, IP networks, Internet, Filtering

References

[1]. "Using the Domain Name System for System Break-Ins" by Steve Bellovin, 1995
[2]. U.S. National Strategy to Secure Cyberspace, p. 30 February 2003
[3]. RIPE NCC DNSSEC Policy Department of Homeland and Security wants master key for DNS Heise News, 30 March 2007
[4]. Analysis: of Owning the keys to the Internet [UPI]], April 21, 2007
[5]. Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, �Simulation Based Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks (MANET)", International Journal of Computer Science, Information Technology and Security, Vol. 2, No. 4, Aug 2012.
[6]. Dipali D. Punwatkar and Kapil N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (65-69), Feb -2014, E-ISSN: 2347-2693
[7]. Shivlal Mewada and Umesh Kumar Singh, �Measurement Based Performance of Reactive and Proactive Routing Protocols in WMN�, Int. Journal of advanced research in Computer Science and Software Engineering, Vol. 1, No. 1, pp(1-4), Dec.-2011.
[8]. M. Nachammai and N. Radha, "Survey on Black Hole and Gray Hole Attacks in MANET", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (66-70), May -2016, E-ISSN: 2347-2693
[9]. Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc Networks", International Journal of Scientific Research in Network Security and Communication, Vol-1, Issue-05, pp.(1-4), Dec 2013.ISSN 2321-3256,
[10]. Nisha Mannan and Shipra Khurana, "Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (233-237), Apr -2014
[11]. M. Nagendra and B.Kondaiah, "A Comparison and Performance Evaluation of On-Demand Routing Protocols for Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (15-19), May -2014,
[12]. Ritika Kachal and Shrutika Suri, "Comparative Study and Analysis of DSR, DSDVAND ZRP in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (148-152), May -2014
[13]. Mayank Kumar and Tanya Singh, "A Survey on Security Issue in Mobile AD-HOC Network and Solutions", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (71-75), Mar -2014,
[14]. Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, �An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)�, International Journal of Computer Science and Information Security, Vol-9, No.4, pp.(106-111), April 2011.
[15]. Nand Kishore, Sukhvir Singh and Renu Dhir, "Energy Based Evaluation of Routing Protocol for MANETs", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (14-17), Mar -2014