pith. machine review for the scientific record. sign in

arxiv: 1511.00568 · v1 · submitted 2015-11-02 · 💻 cs.CR

Recognition: unknown

Network Security Threats and Protection Models

Authors on Pith no claims yet
classification 💻 cs.CR
keywords networkpowersystemsaccessaccountsattacksbeforebrave
0
0 comments X
read the original abstract

In a brave new age of global connectivity and e-commerce, interconnections via networks have heightened, creating for both individuals and organizations, a state of complete dependence upon vulnerable systems for storage and transfer of information. Never before, have so many people had power in their own hands. The power to deface websites, access personal mail accounts, and worse more the potential to bring down entire governments, and financial corporations through openly documented software codes. This paper discusses the possible exploits on typical network components, it will cite real life scenarios, and propose practical measures that can be taken as safeguard. Then, it describes some of the key efforts done by the research community to prevent such attacks, mainly by using Firewall and Intrusion Detection Systems.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.