Network security: analysis of network crimes and data protection methodologies

dc.contributor.authorAdhikarinayake, CK
dc.contributor.authorBaddegama, VW
dc.contributor.authorBandara, GM
dc.contributor.authorErabadda, ELBH
dc.contributor.authorSenarathna, MSR
dc.date.accessioned2022-12-14T07:04:19Z
dc.date.available2022-12-14T07:04:19Z
dc.date.issued2012
dc.description.abstractConP^rs have replaced majority of file based systems. File shareing has become essntional for any company and for any individual with incerasing usuage of technology. systems to be successful. In this paper we have discussed how security of computer based systems can be threatened due to vanous reasons and how these threats can be minimized adopting various methodologies. We bring up current solutions implemented in the current world and some new the oretical designs. The paper is mainly focuses on the users at the endpoints of the network. The security aspect related to provide secured connections between them (data encryption, etc.) is not discussed in the paper.en_US
dc.identifier.citation******en_US
dc.identifier.conferenceCSE Symposium 2014en_US
dc.identifier.departmentDepartment of Computer Science and Engineeringen_US
dc.identifier.facultyEngineeringen_US
dc.identifier.pgnospp. 113-118en_US
dc.identifier.proceedingProceedings of the CSE Symposium 2014en_US
dc.identifier.urihttp://dl.lib.uom.lk/handle/123/19782
dc.identifier.year2012en_US
dc.language.isoenen_US
dc.publisherDepartment of Computer Science and Engineering, University of Moratuwa.en_US
dc.subjectNetwork securityen_US
dc.subjectProtectionen_US
dc.subjectNetwork crimesen_US
dc.titleNetwork security: analysis of network crimes and data protection methodologiesen_US
dc.typeConference-Full-texten_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Network Security.pdf
Size:
1.42 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: