Flexible Data Access Using Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 2
Abstract
Network security has become more important to individual computer users, organizations, and the military worse. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The Network structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. There are currently two fundamentally different networks, data networks and synchronous network comprised of switches. The internet is considered a data network. Since the current data network consists of computer‐based routers, information can be obtained by special programs, such as “Trojan horses,” planted in the routers. The synchronous network that consists of switches does not buffer data and therefore are not threatened by attackers. That is why security is emphasized in data networks, such as the internet, and other networks that link to the internet.
Authors and Affiliations
K. Ramya, K. Pavithradevi, A. Satheesh, R. Shanavash
Smart Automated Video Conference Room System
The aim is to design the automated video conference room system, placed at the center of conference table and use the two voice sensor to locate the speaker in order to capture the face of speaker or person currently sp...
Security Management Access Control System
Authenticating a legitimate user is a trivial task, which is involved in a door lock system, safe lock and also in ATM transactions while accessing bank accounts to secure personal information. Security is a major conce...
Commonly used pesticides in agriculture of Warangal District-Telangana and their consequences on the growth of Vesicular and Arbuscular Mycorrhizal fungi with reference to the DNA and Protein Content
In this paper we described the hazardous affects of the four common pesticides Captain, Bavestin, Endosulfan, Dicofol on VAM growth with reference to DNA ratio and protein content. Initially, we isolated VAM spores from...
Design of Robust Pi/Pid Controller for Two input Two Output Gas Turbine Application
In this paper, design of pi/pid controllers for the gas turbine application is proposed. The gas turbine application considered here is a TITO system which has two inputs and two outputs. In most of the industrial appli...
Efficient Clustering Technique for Information Retrieval in Data Mining
In the emerging new wave of applications where people are the ultimate target of text clustering methods, cluster labels are intended to be read and comprehended by humans. The primary objective of a clustering method s...