Current Computer Network Security Issues/Threats

@article{Yassir2016CurrentCN,
  title={Current Computer Network Security Issues/Threats},
  author={Ammar Yassir and Alaa A. K. Ismaeel},
  journal={International Journal of Computer Applications},
  year={2016},
  volume={155},
  pages={1-5}
}
Computer network security has been a subject of concern for a long period. Many efforts have been made to address the existing and emerging threats such as viruses and Trojan among others without any significant success. Worse, new issues and threats have been emerging given that technology changes and becomes obsolete in a short while. In this regard, this research delves into the current network security issues in order to give future directions of research in a bid to help security… Expand

Figures from this paper

References

SHOWING 1-10 OF 29 REFERENCES
Network and System Security, Second Edition
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters areExpand
Improving Web Application Security Threats And Countermeasures
TLDR
Thank you for reading improving web application security threats and countermeasures, and maybe you have knowledge that, people have search hundreds of times for their chosen books like this, but end up in infectious downloads. Expand
Integrated smart grid systems security threat model
TLDR
The reference architecture of the SG, with its components and communication interfaces used to exchange the energy-related information, is integrated with the results of SG systems security threat analysis to produce a comprehensive, integrated SG SSTM. Expand
Security and Privacy-Enhancing Multicloud Architectures
TLDR
A survey on the achievable security merits by making use of multiple distinct clouds simultaneously according to their security and privacy capabilities and prospects is provided. Expand
Combating Security Breaches and Criminal Activity in the Digital Sphere
Note: The chapters are grouped into four different sections with a particular scope in each. Hence, a small re numbering of the chapters was done. The following is the list of chapters with the newExpand
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles. It begins with a review of fundamental securityExpand
Achieving a consensual definition of phishing based on a systematic review of the literature
TLDR
This work proposes a new definition that is based upon current ones, which defines phishing in a comprehensive way and addresses all important elements of phishing: ‘phishing is a scalable act of deception whereby impersonation is used to obtain information from a target’. Expand
An Exploration of Phishing Information Sharing: A Heuristic-Systematic Approach
Phishing is an attempt to acquire sensitive information from a user by malicious means. The losses due to phishing have exceeded a trillion dollars globally. Social media has provided an alternate toExpand
Security Solutions against Computer Networks Threats
----------------------------------------------------------------------ABSTRACT----------------------------------------------------------The spread of information networks in communities andExpand
Managing Big Data in Cloud Computing Environments
TLDR
Managing Big Data in Cloud Computing Environments explores the latest advancements in the area of data management and analysis in the cloud to explore the way computing infrastructures are abstracted and used. Expand
...
1
2
3
...