![](/jspui/image/bnner.jpg)
Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/301
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Madan, Mamta | - |
dc.date.accessioned | 2024-09-04T09:51:26Z | - |
dc.date.available | 2024-09-04T09:51:26Z | - |
dc.date.issued | 2021 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/301 | - |
dc.description | Being connected to people has become an indispensable part of our day-to-day lives. We stay constantly connected with the people around us. In simple words, Network security can be defined as a connection of multiple devices. With increasing connectivity of devices, it is essential that data shared among a group of devices stays private as intended by the participants of the group. Today’s networking structure is intricate and is faced by constant threat from hackers. Loopholes in network security may lead to serious threats such as Data Modification, DOS attack, Eavesdropping, Botnet, Identity Spoofing, MITM attack, Password – Based attacks etc. This paper briefly introduces the concepts related to Network Security and the threats to which a network may be exposed. It also focuses on resolving various threats faced by networks such as Cryptography, Hashing, Firewalls, VPN, Proxy Servers, Anti-virus soft wares and SSL/TLS. This paper gives in depth consideration to wireless network security and a prospective solution to increase wireless network security. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Advances and Applications in Mathematical Sciences | en_US |
dc.subject | Network Security | en_US |
dc.title | Issues and Threatsin Cloud Network Security | en_US |
dc.type | Article | en_US |
Appears in Collections: | VSIT |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Mamta Madan.pdf | 81.32 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.