Attcack and Saving Network from Attack
تاريخ النشر : 2015-01-02 17:03:08
عدد المشاهدات : 1658
تاريخ النشر : 2015-01-02 17:03:08
عدد المشاهدات : 1658
Available online at http://www.journalcra.com
INTERNATIONAL JOURNAL
OF CURRENT RESEARCH
International Journal of Current Research
Vol. 5, Issue, 01, pp.006-013, January, 2013
ISSN: 0975-833X |
RESEARCH ARTICLE |
|
|
|
Attcack and Saving Network from Attack
*Luaay Abdulwahed
College of nursing, Basra University, Iraq *Corresponding author: Loea1965@yahoo.com, luaay.shihab@uobasrah.edu.iq
ARTICLE INFO
Article History:
Received 25th October, 2012 Received in revised form 28th November, 2012 Accepted 7th December, 2012
Published online 16th January, 2013
ABSTRACT
This paper takes a keen look in network security and network security goals, why computers are insecure and type Of attack, how to improve network security . Securing your network and practical's what is Quota.
Key words: |
|
|
DOS/IP/ICMP/TCP/UDP/ |
|
|
DNS/HTTP |
Copy Right, IJCR, 2012, Academic Journals. All rights reserved. |
|
|
|
INTRODUCTION
Network security comprises the measures a company takes to protect its computer system, and it is a prime concern for every company that uses computers. Compromised network security means a hacker or competitor may gain access to critical or sensitive data, possibly resulting in data loss, or even complete destruction of the system .
Network Security Goals
Confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver decrypts message Privacy: hide `who is doing what with whom
Authentication: sender, receiver want to conform identity of each other
Integrity: sender, receiver want to ensure messages are not altered (in transit, or afterwards) without detection
Access and Availability: services must be accessible and available to users Network Security
Why Computers are Insecure ?
Most PCs use insecure Ross
Most designed for `home` - security not a goal Others support separation between users
Few/none restrict capabilities of applications
Malicious / vulnerable / buggy app can harm all!!
PCs run buggy, vulnerable, even malicious code Many sources (libraries, shareware, …)
Limited awareness & tools.
Limited product liability and consequent damages Most computers don’t fix known vulnerabilities
008 International Journal of Current Research, Vol. 5, Issue, 01, pp.006-013, January, 2013
Thank you for evaluating
BCL easyConverter Desktop
This Word document was converted from PDF with an evaluation version of BCL easyConverter Desktop software that only converts the first 3 pages of your PDF.
CTRL+ Click on the link below to purchase