CFP last date
20 May 2024
Reseach Article

A Brief Study on Measures to Improve Cyber Network Security

Published on May 2015 by J.durga Prasad Rao, Satyendra Kurariya, Ram Krishna Akuli
National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
Foundation of Computer Science USA
ACEWRM2015 - Number 2
May 2015
Authors: J.durga Prasad Rao, Satyendra Kurariya, Ram Krishna Akuli
e9483bdf-8bdd-4f3d-a798-efe396ec021c

J.durga Prasad Rao, Satyendra Kurariya, Ram Krishna Akuli . A Brief Study on Measures to Improve Cyber Network Security. National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering. ACEWRM2015, 2 (May 2015), 20-22.

@article{
author = { J.durga Prasad Rao, Satyendra Kurariya, Ram Krishna Akuli },
title = { A Brief Study on Measures to Improve Cyber Network Security },
journal = { National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering },
issue_date = { May 2015 },
volume = { ACEWRM2015 },
number = { 2 },
month = { May },
year = { 2015 },
issn = 0975-8887,
pages = { 20-22 },
numpages = 3,
url = { /proceedings/acewrm2015/number2/20906-6031/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
%A J.durga Prasad Rao
%A Satyendra Kurariya
%A Ram Krishna Akuli
%T A Brief Study on Measures to Improve Cyber Network Security
%J National Conference Potential Research Avenues and Future Opportunities in Electrical and Instrumentation Engineering
%@ 0975-8887
%V ACEWRM2015
%N 2
%P 20-22
%D 2015
%I International Journal of Computer Applications
Abstract

Security measures are of prime concern to guarantee wellbeing and unwavering quality of associations. Hacking of data and information should be seriously addressed provided they can hamper any major loss to society, nation or at the expense of universe. The researchers feel to encompass limits to have adeep understanding of probable security measures. For example – network integration, cyber issues, firewall, information filtering, error detection and preventionsystem, and security updates.

References
  1. Akaninyene Walter Udoeyop, ?Cyber Profiling for Insider Threat Detection?, 8-2010
  2. ChiChao et al. , ?Cybercrime & Cybercriminals: An Overview of the Taiwan Experience?, Journal of computers, Vol. 1, No. 6, September 2006.
  3. Deng, J. , R. Han and S. Mishra, 2013. Smart environments: technologies, protocols and Defending against path-based DoS attacks in applications, pp: 11-46.
  4. Haboub, R. and M. Ouzzif, 2014. Secure Routing IN ACM workshop on Security of ad hoc and sensor WSN. International Journal, pp: 2. networks. ACM.
  5. Huang, Yan and Yang (2009). Research of Security Metric Architecture for Next Generation Network. Proceedings of IC-NIDC2009.
  6. Implementing a Network Security Metrics Program By Paul W LowansGIAC available on 23 Sep 13
  7. Jain, M. K. , 2013. Wireless sensor networks:
  8. Jeffrey R. DiBiasi, ?Cyberterrorism: Cyber Prevention Vs Cyber Recovery?, 12-2007.
  9. Kalita, H. K. and A. Kar, 2014. Wireless sensor networks. Wireless communications and mobile network security analysis. International Journal of computing, 8(1): 1-24. Next-Generation Networks (IJNGN), 1(1): 1-10
  10. Ning, P. , A. Liu and W. Du, 2014. Mitigating DoS Security issues and challenges. International Journal attacks against broadcast authentication in wireless of Computer and Information Technology, sensor networks. ACM Transactions on Sensor 2(1): 62-67. Networks (TOSN), 4(1): 1.
  11. Seddigh, N. , Pieda, P. , Matrawy, A. , Nandy, B. , Lambadaris, I. , & Hatfield, A. (2004). Current trends and advances in information assurance metrics. Proceedings of PST2004: The Second Annual Conference on Privacy, Security, and Trust. Fredericton, NB
  12. Shumba Rose, ?Home Computer Security Awareness?, Computer Science Department, Indiana University of Pennsylvania.
  13. (www. http://hackmageddon. com/category/security/cyber-attacks-statistics/)
  14. www. nasscom. com
  15. www. cyberlaws. com
Index Terms

Computer Science
Information Sciences

Keywords

System Security Cyber-attacks Cyber Network