Institutional-Repository, University of Moratuwa.  

Network security: analysis of network crimes and data protection methodologies

Show simple item record

dc.contributor.author Adhikarinayake, CK
dc.contributor.author Baddegama, VW
dc.contributor.author Bandara, GM
dc.contributor.author Erabadda, ELBH
dc.contributor.author Senarathna, MSR
dc.date.accessioned 2022-12-14T07:04:19Z
dc.date.available 2022-12-14T07:04:19Z
dc.date.issued 2012
dc.identifier.citation ****** en_US
dc.identifier.uri http://dl.lib.uom.lk/handle/123/19782
dc.description.abstract ConP^rs have replaced majority of file based systems. File shareing has become essntional for any company and for any individual with incerasing usuage of technology. systems to be successful. In this paper we have discussed how security of computer based systems can be threatened due to vanous reasons and how these threats can be minimized adopting various methodologies. We bring up current solutions implemented in the current world and some new the oretical designs. The paper is mainly focuses on the users at the endpoints of the network. The security aspect related to provide secured connections between them (data encryption, etc.) is not discussed in the paper. en_US
dc.language.iso en en_US
dc.publisher Department of Computer Science and Engineering, University of Moratuwa. en_US
dc.subject Network security en_US
dc.subject Protection en_US
dc.subject Network crimes en_US
dc.title Network security: analysis of network crimes and data protection methodologies en_US
dc.type Conference-Full-text en_US
dc.identifier.faculty Engineering en_US
dc.identifier.department Department of Computer Science and Engineering en_US
dc.identifier.year 2012 en_US
dc.identifier.conference CSE Symposium 2014 en_US
dc.identifier.pgnos pp. 113-118 en_US
dc.identifier.proceeding Proceedings of the CSE Symposium 2014 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record