Survey of Secure Computing

نویسنده

  • Kuruvilla Mathew
چکیده

1.1 Related Works .................................................................................................................... 2 1.2 Introduction ....................................................................................................................... 3 1.3 About Information Systems and Security and Applicable Areas ......................................... 4 1.3.1 The Basics ............................................................................................................... 4 1.3.2 Cryptography to the Rescue .................................................................................... 4 1.4 Challenges in Information Security versus Traditional Security ......................................... 5 1.5 Areas in Secure Computing ................................................................................................ 5 1.5.1 Protocol Attacks and Prevention, Secure Protocols ................................................. 6 1.5.1.1 TCP Sequence Number Prediction Attack ............................................... 6 1.5.1.2 Routing Protocol Attacks .......................................................................... 7 1.5.1.3 Server Attacks ........................................................................................... 8 1.5.1.4 Some Other Services/Protocols ................................................................. 9 1.5.1.5 Trivial Issues ............................................................................................10 1.5.2 DoS and Distributed DoS .....................................................................................11 1.5.2.1 Background .............................................................................................11 1.5.2.2 DoS and Distributed DoS Attacks ...........................................................11 1.5.2.3 DoS and DDoS Attack Defenses ............................................................ 12 1.5.3 Botnets ..................................................................................................................13 1.5.4 Database, Web, and Cloud Security ......................................................................13 1.5.4.1 Database Security ....................................................................................14 1.5.4.2 Web Security ...........................................................................................15 1.5.4.3 Cloud Computing and Security ...............................................................17 1.5.5 Mobile and Wireless (Including Android and Smart Devices) ...............................18 1.5.5.1 About Mobile Security: Definition and Need ..........................................18 1.5.5.2 Categories of Attacks on Mobile Devices .................................................19 1.5.6 Social Media and Social Aspects of Computer Security .........................................21 1.5.7 Multimedia Security ..............................................................................................21

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

Improving Mobile Grid Performance Using Fuzzy Job Replica Count Determiner

Grid computing is a term referring to the combination of computer resources from multiple administrative domains to reach a common computational platform. Mobile Computing is a Generic word that introduces using of movable, handheld devices with wireless communication, for processing data. Mobile Computing focused on providing access to data, information, services and communications anywhere an...

متن کامل

Task Scheduling in Fog Computing: A Survey

Recently, fog computing has been introducedto solve the challenges of cloud computing regarding Internet objects. One of the challenges in the field of fog computing is the scheduling of tasks requested by Internet objects. In this study, a review of articles related to task scheduling in fog computing has been done. At first, the research questions and goals will be introduced, an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014