Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2008
Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come within the internal network. These internal ...
Intrusion-detection systems (IDS) aim at detecting attacks against computer systems and networks or, in general, against information systems. Its basic aim is to protect the system against malwares and unauthorized access of a network or a system. Intrusion Detection is of two types Network-IDS and Host Based-IDS. This paper covers the scope of both the types and their result analysis along with their comparison as stated. OSSEC (HIDS) is a free, open source host-base intrusion detection system. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, time-based alerting and active response. While Snort (NIDS) is a lightweight intrusion detection system that can log packets coming across your network and can alert the user regarding any attack. Both are efficient in their own distinct fields.
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT
Computer Network Security SystemNetwork security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. Many businesses secure themselves from the internet by means of firewalls and encryption mechanisms. The businesses create an “intranet” to remain connected to the internet but secured from possible threats. The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being perfo...
succeeding far too frequently, all due to the limitations of legacy security tools. Because many security technologies arose in an earlier era—when attacks targeting sensitive information were fairly straightforward to identify—these tools fail when they cannot recognize a previously unknown attack or threat vector. In the last few years, the scale and sophistication of IT security threats have
Vaagdevi International Conference on Information Technology for Real World Problems
New Frontiers of Network Security: The Threat Within2010 •
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends of mobility (portable devices like Laptop, smart phones and iPads etc), ubiquitous connectivity (wireless or through 3G connectivity) and this trend increases as more and more web-based applications are made available over the Internet. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have authorized access to the organization's network and servers. Theft of confidential information is often for either material gain or for wilful damage. Easy availability of hacking tools on the Internet, USB devices and wireless connectivity provide for easy break-ins. The net result is losses worth millions of dollars in terms of IP theft, leakage of customer / individual information, etc. This paper presents an understanding of the Insider threats, attackers and their motives and suggests mitigation techniques at the organization level.
The security of computer networks connected to the Internet is an important, vital and hotly contested real-world issue. Once the computer networks get connected to the Internet, the number of attacks, their strength and intensity grow exponentially. All the attacks then exploit breaches in the network security. In this paper we present some of the passive and active attacks against the computer networks. The anatomy of the attack is presented showing the phases and the techniques for penetrating into the computer networks - with the purpose to stress and highlight the several dangers faced by the network manager and the utmost necessity of setting a proper corporate network security policy in place. The detection of an attack is a difficult task because the detection technology is still in its infancy and has yet to mature, also once the attack is detected, the attacker in most cases still remains unknown. After the detection of the attack, the analyst needs some time to establish ...
International Journal of Internet Technology and Secured Transactions
Security of internet-connected computer networks2010 •
Title: Notions of Privacy at Early Modern European Courts: Reassessing the Public and Private Divide, 1400-1800 Volume editors: Dustin M. Neighbors, Lars Cyril Nørgaard & Elena Woodacre Publisher: Amsterdam University Press Grand, extravagant, magnificent, scandalous, corrupt, political, personal, fractious; these are terms often associated with the medieval and early modern courts. Moreover, the court constituted a forceful nexus in the social world, which was central to the legitimacy and authority of rulership. As such, courts shaped European politics and culture: architecture, art, fashion, patronage, and cultural exchanges were integral to the spectacle of European courts. Researchers have convincingly emphasised the public nature of courtly events, procedures, and ceremonies. Nevertheless, court life also involved pockets of privacy, which have yet to be systematically addressed. This edited collection addresses this lacuna and offers interpretations that urge us to reassesses the public nature of European courts. Thus, the publication fertilises the grounds for a discussion of the past and future of court studies. Indeed, the contributions make us reconsider present-day understandings of privacy as a stable and uncontestable notion. For more information visit https://www.aup.nl/en/book/9789463720076/notions-of-privacy-at-early-modern-european-courts
Faraldo, José M. / Gulińska-Jurgiel, Paulina / Domnitz, Christian (Eds.) Europa im Ostblock. Vorstellungen und Diskurse, Wien/Köln: Böhlau Verlag, pp. 91-110
Die Hüterin der europäischen Zivilisation. Kommunistische Europa-Konzeptionen am Vorabend des Kalten Krieges (1944-1948)2008 •
"Heuzutage ist die Sowjetunion Hüterin der besten Traditionen der europäischen Zivilisation und des Humanismus."
HAL (Le Centre pour la Communication Scientifique Directe)
Corrélats cérébraux de l’écriture manuscrite chez l’adulte et l’enfant2021 •
International journal for multidisciplinary research
Influence of Project Management Skills on Project Sustainability: A Case of Vision 2020 Umurenge Program in Burera District, Rwanda1987 •
Nigerian Journal of Natural Products and Medicine
Pharmacognostic Studies on the Leaves of <i>Vernonia amygdalina</i> Del. (Asteraceae)2005 •
International Journal of Early Childhood Special Education (INT-JECS)
Status of Science Teaching Laboratories of State Universities and Colleges in One Region of the Philippines: Basis for Plan of Action2022 •
1992 •
Kidney International
Post-transplantation nephrosis in congenital nephrotic syndrome of the Finnish type1993 •
Investigação Qualitativa em Educação: Avanços e Desafios // Investigación Cualitativa en Educación: Avances y Desafíos
Educação Popular: Gênero, Expressão Fotográfica e Reforma Agrária no Rio de Janeiro2021 •
Perspectivas Rurales Nueva Epoca
El Instituto Mixto de Ayuda Social, eje central en el combate a la pobreza1998 •
Suplemento Cultural El Tlacuache
Cuernavaca y sus paisajes: algunos elementos sobre su origen2024 •