Flexible Data Access Using Network Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 2
Abstract
Network security has become more important to individual computer users, organizations, and the military worse. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The Network structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. There are currently two fundamentally different networks, data networks and synchronous network comprised of switches. The internet is considered a data network. Since the current data network consists of computer‐based routers, information can be obtained by special programs, such as “Trojan horses,” planted in the routers. The synchronous network that consists of switches does not buffer data and therefore are not threatened by attackers. That is why security is emphasized in data networks, such as the internet, and other networks that link to the internet.
Authors and Affiliations
K. Ramya, K. Pavithradevi, A. Satheesh, R. Shanavash
Gas Level Alert and Automatic Cut-Off in a Stove
this paper proposes a technique which lets us to completely eliminate any mishappenings that generally occur with the leakage of gas in a daily base Gas stove system. The system can be operated in a way as to check whet...
A Review on Planning for An Exploratory Well
A well is planned generally to ensure it is safe and economical in nature. It integrates engineering principles co-private or personal philosophies. Prospect development, data collection, pore formation, geology, casing...
Authenticated Key Exchange Protocols For pNFS
We study the problem of key generation for secure many to many communications. The problem is raised by the rise of large scale distributed file system supporting parallel access to multiple storage devices. Our work fo...
Comparative Study of DPPH, ABTS and FRAP Assays for Determination of Antioxidant Activity
Three simple spectrophotometric methods: (1, 1-diphenyl-2-picrylhydrazyl) free radical scavenging activity assay (DPPH), [2,2’-azinobis(3-ethylbenzothiazoline-6-sulphonic acid)] free radical scavenging activity assay (A...
Tunability of ZnO Optical Band on Varying Zn2+ Concentration
Zinc oxide (ZnO) film is grown by utilizing Ammonium Zincate precursor through Successive Ionic Layer Adsorption and Reaction (SILAR). SILAR processes involves subsequent dipping cycles in cationic and anionic solution...