Flexible Data Access Using Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 2
Abstract
Network security has become more important to individual computer users, organizations, and the military worse. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The Network structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. There are currently two fundamentally different networks, data networks and synchronous network comprised of switches. The internet is considered a data network. Since the current data network consists of computer‐based routers, information can be obtained by special programs, such as “Trojan horses,” planted in the routers. The synchronous network that consists of switches does not buffer data and therefore are not threatened by attackers. That is why security is emphasized in data networks, such as the internet, and other networks that link to the internet.
Authors and Affiliations
K. Ramya, K. Pavithradevi, A. Satheesh, R. Shanavash
Advanced Home Security System
The concept of home automation has been around since the late 1970s. But with the advancement of technology and services people’s expectations have changed and so as the idea of home automation systems. In this paper we...
An Approach for Certificate Less Key Management with Energy Based Routing Protocol
In dynamic Wireless sensor networks, we enhance the Certificateless-effective key management (CL-EKM) protocol for secure communication with Efficient Energy System. We are going to find the proper value for the Tbackof...
Improvement in Polysulfone(PSf) Film Properties by Porogen Concept
Polysulfone (PSf) is the most widely used polymer for preparation of ultrafiltration membranes. Its preparation need to be optimized to obtain membranes with desired qualities. PEG can be used as porogenic additive in t...
A Review Of Clinical Data Prediction Using Different Data Mining Technique And Neuro-Fuzzy System
The diagnosis of clinical data is a major issue in the automation system. The automation system increases the efficiency and reliability of prediction of symptoms. In this paper presents the review of different techniqu...
Silicon Wafer Technologies: Past & Future
Silicon is now best substrate material for IC technologies. This paper is review about development of wafer technologies in past and future. Also discuss about silicon crystal growth, Silicon on Insulator technologies a...