Current Computer Network Security Issues/Threats

  title={Current Computer Network Security Issues/Threats},
  author={Ammar Yassir and Alaa A. K. Ismaeel},
  journal={International Journal of Computer Applications},
Computer network security has been a subject of concern for a long period. Many efforts have been made to address the existing and emerging threats such as viruses and Trojan among others without any significant success. Worse, new issues and threats have been emerging given that technology changes and becomes obsolete in a short while. In this regard, this research delves into the current network security issues in order to give future directions of research in a bid to help security… 

Figures from this paper



Network and System Security, Second Edition

Network and System Security provides focused coverage of network and system security technologies, providing a new level of technical expertise not found elsewhere and enhancing the reader's grasp of the material and ability to implement practical solutions.

Improving Web Application Security Threats And Countermeasures

Thank you for reading improving web application security threats and countermeasures, and maybe you have knowledge that, people have search hundreds of times for their chosen books like this, but end up in infectious downloads.

Security and Privacy-Enhancing Multicloud Architectures

A survey on the achievable security merits by making use of multiple distinct clouds simultaneously according to their security and privacy capabilities and prospects is provided.

Combating Security Breaches and Criminal Activity in the Digital Sphere

Note: The chapters are grouped into four different sections with a particular scope in each. Hence, a small re numbering of the chapters was done. The following is the list of chapters with the new

Security of Self-Organizing Networks: MANET, WSN, WMN, VANET

Reflecting cutting-edge advancements, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET explores wireless network security from all angles to highlight potential threats to network security.

Achieving a consensual definition of phishing based on a systematic review of the literature

This work proposes a new definition that is based upon current ones, which defines phishing in a comprehensive way and addresses all important elements of phishing: ‘phishing is a scalable act of deception whereby impersonation is used to obtain information from a target’.

An Exploration of Phishing Information Sharing: A Heuristic-Systematic Approach

The findings suggest that the phishing messages that afford coping strategies, and come from users with higher credibility are likely to achieve higher level of sharing.

Security Solutions against Computer Networks Threats

A review of the literature by using earlier researches and library approach, to provide security solutions in the face of threats to their computer networks and lead to more understanding of security threats and ways to deal with them and help to implement a secure information platform.

Managing Big Data in Cloud Computing Environments

Managing Big Data in Cloud Computing Environments explores the latest advancements in the area of data management and analysis in the cloud to explore the way computing infrastructures are abstracted and used.