نتایج جستجو برای: network security

تعداد نتایج: 818903  

2012
Mamatha T

A mobile ad hoc network (MANET) is a network consisting of a collection of nodes capable of communicating with each other without the help from a network infrastructure. Although security issues in mobile ad hoc networks have been a major focus in the recent years, the development of fully secure schemes for these networks has not been entirely achieved till now. MANETs have a unique characteri...

2014
Devesh Kumar Pal Pallavi Murghai Goel

In this paper, we discuss security issues and their current solutions in the mobile ad hoc network. Ad hoc networks are a new wireless network for mobile hosts. Owe to the vulnerable nature of the mobile ad hoc network, there are many security threats that effected the development of wireless network. We evaluate the accessible in the mobile ad hoc networks and find out attacks than the convent...

2012
Brijesh Singh Yadav Parul Yadav

Wireless local area networks (WLAN) are beginning to play a much larger role in corporate network environments and are already very popular for home networking applications. This increase in accessibility has created large security holes for hackers and thieves to abuse, that is finally being addressed by stronger security protocols and these security protocols include Wired Equivalent Privacy ...

2009
Rainer Falk Christian Günther Dirk Kröselberg Avi Lior

WiMAX networks provide broadband data access to mobile as well as stationary users. While the wireless link is based on the 802.16e-2005 specification developed by IEEE, a complete network architecture “behind the base station” with global roaming support has been specified by the WiMAX forum. The security architecture for these networks covers EAP/AAA-based secure network access, secure bootst...

2004
Oliver Welter Andreas Pilz

IP-based networks form the base of todays communication infrastructure. The interconnection of formerly isolated networks brings up severe security issues. The standard approach, to protect the own network from abuse, is the usage of filter mechanisms at the border to the foreign network. The raising complexity of protocols and the use of encryption techniques render most of these borderoriente...

2014
Christian Pitscheider

Computer network security is the first line of defence to accomplish information assurance. The computer network is at risk without a well-designed and flawless implemented network security policy. The main problem is that network administrators are not able to verify the network security policy. Although further research has been carried out, it mainly concerns small specific parts of the over...

2013
Madhavi Latha

The explosion of the public Internet and ecommerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees and even human error all represent clear and present dangers to networks. Loss of irreplaceable data is a very real threat for any business owner whose network connects to the outside worl...

2002

The CIA TRIAD The following is how to preserve the CIA triad in the telecommunications and network security domain: Confidentiality – Network Security Protocols – Network authentication services – Data Encryption Services Integrity-Firewall Services-Communications Security Management-IDS's Availability-Fault tolerance for data availability, such as backups and redundant disk systems-Acceptable ...

2005
Sun Microsystems

W iretaps have been used since the invention of the telegraph and have been a legal element of the US law enforcement arsenal for more than a quarter century. In keeping with law enforcement’s efforts to keep laws current with changing technologies, in 1994 the US Congress passed the Communications Assistance for Law Enforcement Act (CALEA). The law proved to be controversial because it mandate...

2012
Gunjan Gupta Rama Chawla

With the explosive growth in the Internet, network security has become an inevitable concern for any organization whose internal private network is connected to the Internet. Network security is setup to guard against unauthorized access, alteration, or modification of information, and unauthorized denial of service. When a network is connected to the network that is vulnerable to potential int...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید