Security Technology
Keywords:
Security, Fires, IP networks, Internet, FilteringAbstract
All input is evil until proven otherwise!‖”so security technology come into play.With the rapid growth of interest in the Internet, network security has become a major concern to companies throughout the world. The fact that the information and tools needed to penetrate the security of corporate networks are widely available has increased that concern. Because of this increased focus on network security, network administrators often spend more effort protecting their networks than on actual network setup and administration. Tools that probe for system vulnerabilities, such as the Security Administrator Tool for Analyzing Networks (SATAN), and some of the newly available scanning and intrusion detection packages and appliances, assist in these efforts, but these tools only point out areas of weakness and may not provide a means to protect networks from all possible attacks. Thus, as a network administrator, you must constantly try to keep abreast of the large number of security issues confronting you in today's world. This paper describes many of the security issues that arise when connecting a private network. Understand the types of attacks that may be used by hackers to undermine network security. For decades, technology has transformed almost every aspect of business, from the shop floor to the shop door. While technology was a fundamental enabler, it was often driven from an operational or cost advantage and seen as separate from business itself. The new reality is that technology doesn’t support the business—technology powers the business. IT risks are now business risks and IT opportunities are now business opportunities.
References
. "Using the Domain Name System for System Break-Ins" by Steve Bellovin, 1995
. U.S. National Strategy to Secure Cyberspace, p. 30 February 2003
. RIPE NCC DNSSEC Policy Department of Homeland and Security wants master key for DNS Heise News, 30 March 2007
. Analysis: of Owning the keys to the Internet [UPI]], April 21, 2007
. Shivlal Mewada, Umesh Kumar Singh and Pradeep Kumar Sharma, “Simulation Based Performance Evaluation of Routing Protocols for Mobile Ad-hoc Networks (MANET)", International Journal of Computer Science, Information Technology and Security, Vol. 2, No. 4, Aug 2012.
. Dipali D. Punwatkar and Kapil N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (65-69), Feb -2014, E-ISSN: 2347-2693
. Shivlal Mewada and Umesh Kumar Singh, “Measurement Based Performance of Reactive and Proactive Routing Protocols in WMN”, Int. Journal of advanced research in Computer Science and Software Engineering, Vol. 1, No. 1, pp(1-4), Dec.-2011.
. M. Nachammai and N. Radha, "Survey on Black Hole and Gray Hole Attacks in MANET", International Journal of Computer Sciences and Engineering, Volume-04, Issue-05, Page No (66-70), May -2016, E-ISSN: 2347-2693
. Leena Pal, Pradeep Sharma, Netram Kaurav and Shivlal Mewada, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc Networks", International Journal of Scientific Research in Network Security and Communication, Vol-1, Issue-05, pp.(1-4), Dec 2013.ISSN 2321-3256,
. Nisha Mannan and Shipra Khurana, "Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-04, Page No (233-237), Apr -2014
. M. Nagendra and B.Kondaiah, "A Comparison and Performance Evaluation of On-Demand Routing Protocols for Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (15-19), May -2014,
. Ritika Kachal and Shrutika Suri, "Comparative Study and Analysis of DSR, DSDVAND ZRP in Mobile Ad-Hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-05, Page No (148-152), May -2014
. Mayank Kumar and Tanya Singh, "A Survey on Security Issue in Mobile AD-HOC Network and Solutions", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (71-75), Mar -2014,
. Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks (MANET)”, International Journal of Computer Science and Information Security, Vol-9, No.4, pp.(106-111), April 2011.
. Nand Kishore, Sukhvir Singh and Renu Dhir, "Energy Based Evaluation of Routing Protocol for MANETs", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (14-17), Mar -2014
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
