Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come within the internal network. These internal threats may come from disgruntle staffs, hackers, virus attack, or even corporate espionage. At any corporate network, a number of active port are located through out the organization, this could be a loophole for a security breach. A hacker may enter the network by inserting a cable to an active port which is not secure within the building. Sometimes system administrator does not have the time to check on every connection that are active and not in use on a daily bas...
The purpose of this article is to present the major issues regarding threats to the security of netw...
Security is main issue of this generation of computing because many types of attacks are increasing ...
This paper, presented in the form of sample guidelines/procedures, will express in much detail the s...
The level of unauthorized access to computer network resources, called hacking, has gradually increa...
With more and more people working at home and connecting to company networks via the Internet, the r...
The connection of an internal network to an external network such as Internet has made it vulnerable...
Nowadays it's impossible to imagine a company that doesn't use Internet and Intranet (LAN) to move c...
Computer Networking is not something new today. Almost every company there is a Computer Network to ...
A methodology for the ensured security of a workstation connected in a computer network with in an o...
This paper describes an investigation into how an employee using a virtual environment can circumven...
Corporations face a dangerous threat that existing security technologies do not adequately address, ...
Improperly configured computer systems can be compromised and have their data destroyed or stolen; u...
Protecting confidential information is a major concern for organizations and individuals alike, who ...
With the rapid increase in the number of LAN connections to the world's largest computer network (th...
This project explores the technical issues associated with the detection and prevention of malware. ...
The purpose of this article is to present the major issues regarding threats to the security of netw...
Security is main issue of this generation of computing because many types of attacks are increasing ...
This paper, presented in the form of sample guidelines/procedures, will express in much detail the s...
The level of unauthorized access to computer network resources, called hacking, has gradually increa...
With more and more people working at home and connecting to company networks via the Internet, the r...
The connection of an internal network to an external network such as Internet has made it vulnerable...
Nowadays it's impossible to imagine a company that doesn't use Internet and Intranet (LAN) to move c...
Computer Networking is not something new today. Almost every company there is a Computer Network to ...
A methodology for the ensured security of a workstation connected in a computer network with in an o...
This paper describes an investigation into how an employee using a virtual environment can circumven...
Corporations face a dangerous threat that existing security technologies do not adequately address, ...
Improperly configured computer systems can be compromised and have their data destroyed or stolen; u...
Protecting confidential information is a major concern for organizations and individuals alike, who ...
With the rapid increase in the number of LAN connections to the world's largest computer network (th...
This project explores the technical issues associated with the detection and prevention of malware. ...
The purpose of this article is to present the major issues regarding threats to the security of netw...
Security is main issue of this generation of computing because many types of attacks are increasing ...
This paper, presented in the form of sample guidelines/procedures, will express in much detail the s...