Study of Protocols Associated Security Attacks and Proposing Simplified Method for Improvisation

Provided by: Research In Motion
Topic: Security
Format: PDF
With the enormous growth in the usage of computer and communication networks, security threats and security breaches has also increased. Recent survey reports state that not only the large organizations but even smaller organizations are also rapidly targeted. Smaller networks face many types of attacks, but recently the attacks which are initiated or performed by exploiting Protocols has created greater challenges for keeping network secure. There are mechanisms already available for countering these attacks but due to rapid change in technology they are not enough.

Find By Topic