NS in Digitalization: Attacks and Defence

Authors(2) :-M. Soundharya, Mrs. E. Bhuvaneswari

NS is become a gambol in our whole world. In today's world the volume of data increases every second and threats continue to transform and grow, weakening your ability to attacks. The business world is going digital as a result to bypass these things and we are adopting different methods. Network administrator has to keep track, has to update with all current advances in both the software and hardware fields to avert the user's data. Digitalization is playing an important role and integrated of digital technologies into our daily life. This paper precise similar method which are used to attack as well as various mechanisms against to defense them.

Authors and Affiliations

M. Soundharya
Research Scholar, Department of Computer Science,Kamban College of Arts and Science for Women, Thiruvannamalai, Tamil Nadu, India
Mrs. E. Bhuvaneswari
Assistant Professor,Department of Computer Science,Kamban College of Arts and Science for Women, Thiruvannamalai, Tamil Nadu, India

DOS attacks, Encryption, Firewalls, Port Scanning, SHTTP, SSL, VPN

  1. R.E.Mahan, "Introduction to Computer & Network Security," Washington State University, 2000.
  2. M.Kassim, "An Analysis on bandwidth Utilization and Traffic Pattern." IA CSIT Press, 2011.
  3. M.M.B.W Picoulas J, “Software Agents and Computer Network Security." Napier University, Scotland, UK.
  4. A.R.F. Hamedani, "Network Security Issues, Tools for Testing," School of Information Science, Halmstad University, 2010.

Publication Details

Published in : Volume 4 | Issue 3 | January-February 2018
Date of Publication : 2018-03-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 137-142
Manuscript Number : CSEIT184324
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

M. Soundharya, Mrs. E. Bhuvaneswari, "NS in Digitalization: Attacks and Defence", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 3, pp.137-142, January-February-2018.
Journal URL : http://ijsrcseit.com/CSEIT184324

Article Preview