TITLE

Type of Security Threats and It's Prevention

AUTHOR(S)
Ahmad, Ateeq
PUB. DATE
April 2012
SOURCE
International Journal of Computer Technology & Applications;2012, Vol. 3 Issue 2, p750
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The term online system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The basic aim of this article is to Prevention against unauthorized security Attack and Threats.
ACCESSION #
79277868

 

Related Articles

  • Promising career in Cyber Security. Kumar, Amit // Digital Learning;Nov2013, Vol. 9 Issue 11, p60 

    The article discusses the need for India to have cyber security professionals to secure and preserve the prosperity of the country. It is stated that the country needs five lakh cybersecurity experts by 2015 to support its fast growing Internet economy as per an estimate by the union ministry of...

  • Executive Overview.  // MIS Quarterly;Mar90, Vol. 14 Issue 1, p44 

    The article discusses the relation between management information systems (MIS) managers and the risks associated with potential computer abuses. A study was conducted using questionnaires sent to 5,489 Data Processing Management Association (DPMA) members to discover how abuses such as the...

  • Cyber to the Citizen. Doody, John // ITNOW;Sep2014, Vol. 56 Issue 3, p40 

    John Doody FBCS CITP asks if you would leave your house unlocked when you go to work.

  • A survey on intrusion detection techniques. Sonawane, Sandip; Pardeshi, Shailendra; Prasad, Ganesh // World Journal of Science & Technology;2012, Vol. 2 Issue 3, p127 

    Intrusion detection system (IDS) is a security layer that is used to discover ongoing intrusive attacks and anomaly activities in information systems and is usually working in a dynamically changing environment. Although increasing IDSs are developed in the literature, network security...

  • Defense in Depth. Byres, Eric J. // InTech;Nov/Dec2012, Vol. 59 Issue 6, p38 

    The article discusses the use of the Defense in Depth strategy in improving cybersecurity or computer network security in the industrial automation industry. It addresses the deficiencies of relying on a single defensive solution, such as a single Internet firewall. The characteristics of a...

  • Network Layer Firewall.  // Network Dictionary;2007, p336 

    An encyclopedia entry for "Network Layer Firewall" is presented. It is a type of firewall that works as a packet filter by deciding what packets will pass the firewall according to rules defined by the administrator. Generally, network layer firewalls fall into two sub-categories, stateful and...

  • WHO DO YOU TRUST?  // Electronic Design;12/8/2004, Vol. 52 Issue 27, p58 

    The article informs that secure communication comes down to a matter of trust. An authenticated message from an authenticated source can be used accordingly based upon the confidence level of the source. A source trusted to provide embedded-system updates can send new program code while an...

  • Enterprise security is fraying at the edges.  // MarketWatch: Technology;Jul2007, Vol. 6 Issue 7, p16 

    The article focuses on the issue of information security management particularly in the online industry. In many organizations, a great deal of sensitive data marks as the lifeblood of their operations. Putting these information in the web might expose it to risk considering that the Internet is...

  • InfoSec Spending to Focus on Application Security in 2010. Chickowski, Ericka // Channel Insider;8/4/2009, p1 

    The article offers information on the research conducted by InfoPro Corp. regarding the implementation of application security in various organizations in the U.S. Researchers found that majority of respondents plans to impose application security in 2010. Moreover, 82% are the 246 security...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics