Academic Journals Database
Disseminating quality controlled scientific knowledge

Attacks on Computer Network and Corresponding Security Measures

Author(s): Gajanan D. Kurundkar | Quadri M.N | Dr.Santosh D. Khamitkar

Journal: International Journal of Advanced Research in Computer Science
ISSN 0976-5697

Volume: 01;
Issue: 04;
Start page: 32;
Date: 2010;
Original page

Keywords: Intruder | cryptography | prevention | security | real | time | prevention | hash | based | protection | MD5 | Algorithm

Computer security means action of preventing and detecting unconstitutional use of your computer. Prevention measures help you to stop "intruders" from accessing any part of your computer system. With the free flow of routing data and the high availability of computer resources, possible threats to the networks can result in loss of privacy and in spiteful use of information or resources that can eventually lead to large financial losses. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. Intrusion detection is the method of monitoring the events taking place in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, standard security practices. Incidents have many causes, such as malware. Attackers gaining unauthorized access to systems from the Internet, and authorized users of systems who mishandling their privileges or attempt to gain additional privileges for which they are not authorized. Although many incidents are malicious in nature, many others are not. Intrusion prevention systems are purpose-built hardware/software platforms that are designed to analyze, detect, and report on security related events. These are designed to inspect traffic and based on their configuration or security policy, they can drop malicious traffic. Intrusions encompass many undesirable activities, such as information theft and denial of service attacks.
Why do you need a reservation system?      Save time & money - Smart Internet Solutions