Security

Improving and Maintaining Network Security Using MD5 Algorithm

Download Now Free registration required

Executive Summary

Networking devices and intrusion detection systems are capable of generating large volumes of audit information. This information should be considered sensitive. Privacy concerns must also be considered, as there are many legal and ethical issues with maintaining these types of data sets. Until now, little attention has been paid to protecting these data sets from attackers, both internal and external. While advances in computer and communications technology have made the network everywhere, they have also rendered networked systems vulnerable to malicious attacks orchestrated from a distance. These attacks, usually called cracker attacks or intrusions, start with crackers infiltrating a network through a vulnerable host and then going on to launch further attacks.

  • Format: PDF
  • Size: 359.4 KB