We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Computer Networks: Current Developments in its Security

Published on November 2015 by V. B.ambare, R.g.bhople, B. A. Dongardive, M.s.chavan
National Conference on Recent Trends in Mobile and Cloud Computing
Foundation of Computer Science USA
NCRMC2015 - Number 1
November 2015
Authors: V. B.ambare, R.g.bhople, B. A. Dongardive, M.s.chavan
fada3396-1620-42ca-af4b-b13e4710ecce

V. B.ambare, R.g.bhople, B. A. Dongardive, M.s.chavan . Computer Networks: Current Developments in its Security. National Conference on Recent Trends in Mobile and Cloud Computing. NCRMC2015, 1 (November 2015), 21-25.

@article{
author = { V. B.ambare, R.g.bhople, B. A. Dongardive, M.s.chavan },
title = { Computer Networks: Current Developments in its Security },
journal = { National Conference on Recent Trends in Mobile and Cloud Computing },
issue_date = { November 2015 },
volume = { NCRMC2015 },
number = { 1 },
month = { November },
year = { 2015 },
issn = 0975-8887,
pages = { 21-25 },
numpages = 5,
url = { /proceedings/ncrmc2015/number1/23312-2906/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Mobile and Cloud Computing
%A V. B.ambare
%A R.g.bhople
%A B. A. Dongardive
%A M.s.chavan
%T Computer Networks: Current Developments in its Security
%J National Conference on Recent Trends in Mobile and Cloud Computing
%@ 0975-8887
%V NCRMC2015
%N 1
%P 21-25
%D 2015
%I International Journal of Computer Applications
Abstract

In this paper, we described the Computer network security because it has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an "intranet" to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet's beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed.

References
  1. Dowd, P. W. ; McHenry, J. T. , "Network security: it's time to take it seriously," Computer, vol. 31, no. 9, pp. 24?28, Sep 1998
  2. Adeyinka, O. , "Internet Attack Methods and Internet Security Technology," Modeling & Simulation, 2008. AICMS08. Second Asia International Conference on, vol. , no. , pp. 77?82, 13?15 May 2008
  3. Tyson, J. , "How Virtual private networks work,"http://www. howstuffworks. com/vpn. htm .
  4. Al?Salqan, Y. Y. , "Future trends in Internet security," Distributed Computing Systems, 1997. , Proceedings of the Sixth IEEE Computer Society Workshop on Future Trends of , vol. , no. , pp. 216?217, 29?31 Oct 1997
  5. Curtin, M. "Introduction to Network Security," http://www. interhack. net/pubs/network?security.
  6. Fundamentals of network security / John E. Canavan, p. cm. —(Artech House telecommunications library) Includes bibliographical references and index. ISBN 1-58053-176-8 (alk. paper)
Index Terms

Computer Science
Information Sciences

Keywords

Intrane