CFP last date
20 December 2024
Reseach Article

Internet Security – Bridge to prevent Cyber Crimes

Published on May 2012 by Simar Preet Singh, Raman Maini
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 9
May 2012
Authors: Simar Preet Singh, Raman Maini
f0659ce0-7713-4332-9ae7-8251d3c662e0

Simar Preet Singh, Raman Maini . Internet Security – Bridge to prevent Cyber Crimes. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 9 (May 2012), 1-4.

@article{
author = { Simar Preet Singh, Raman Maini },
title = { Internet Security – Bridge to prevent Cyber Crimes },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 9 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 1-4 },
numpages = 4,
url = { /proceedings/rtmc/number9/6682-1069/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Simar Preet Singh
%A Raman Maini
%T Internet Security – Bridge to prevent Cyber Crimes
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 9
%P 1-4
%D 2012
%I International Journal of Computer Applications
Abstract

Since Internet Security is in the forefront of Cyber Crimes for protection from attackers, it is crucial to have a good understanding of threats of Internet Security. This paper evaluates the importance and need of the internet security with different kinds of threats related to internet security. Different kinds of internet security measures are studied in order to evaluate the threats of internet security. Further, the various types of internet security are studied to validate the threats. It has been observed that the Cyber Crimes are increasing these days due to lack of awareness of the user, and the lack of knowledge of preventing from those attacks.

References
  1. Simmonds, A; Sandilands, P; van Ekert, L (2004). "An Ontology for Network Security Attacks". Lecture Notes in Computer Science 3285: 317–323.
  2. A Role-Based Trusted Network Provides Pervasive Security and Compliance - interview with Jayshree Ullal, senior VP of Cisco
  3. William R. Cheswick, Steven M. Bellovin „Firewalls And Internet Security?, Second Edition, pp. 107-110, April 2003.
  4. John R. Vacca, „Practical Internet Security?, published in 2007.
  5. Dave Dittrich, Network monitoring/Intrusion Detection Systems (IDS), University of Washington.
  6. Julian Fredin, Social software development program Wi-Tech
  7. Introduction to Network Security, Matt Curtin.
  8. Hans – AntiHacking Anticipation Society
  9. Security Monitoring with Cisco Security MARS, Gary Halleen/Greg Kellogg, Cisco Press
  10. Network Security: PRIVATE Communication in a PUBLIC World, Charlie Kaufman | Radia Perlman | Mike Speciner, Prentice-Hall, 2002. ISBN .
  11. Network Infrastructure Security, Angus Wong and Alan Yeung, Springer, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Network Security E-mail Security Threats Keyloggers.