ARCHIVES
VOL. 3, ISSUE 2 (2018)
Network security assessment for vulnerabilities and intrusion detection
Authors
Ajay Kumar, Dr. Saurabh Srivastava
Abstract
During the past two last decades we observed the origin and the expansion of a technology that has very much changed the way we work and live. Interconnection of computers through networking and the innovation of the internet were foundation stone of the new technology age. This feature leads to more computing power, improved flexibility and better execution/value ratio. The present enhancements in current technology have empowered the utilization of systems in leading business and in assembling and sharing data in companies and scholarly organizations using the Internet. Today, banks utilization of systems to perform its budgetary operations, clinics has the records of their patients in databases, and numerous organizations have been displayed on the Internet etc. Network and system security are major issues for any association that employs information technology (IT) to attain its tactical and operational goals. While information system (IS) security concerns typically spotlight on those which are from parties that outside to the associations, as a matter of fact information systems are also vulnerable to internal attacks. An IDS examine all inbound and outbound network movements, system logs and actions, and identifies any malicious patterns that may specify a network of system attack from somebody who tried to smash into or compromise a system. This work identifies a number of important issues related to design and implementation and for assessing or deploying commercial
Download
Pages:673-675
How to cite this article:
Ajay Kumar, Dr. Saurabh Srivastava "Network security assessment for vulnerabilities and intrusion detection". International Journal of Academic Research and Development, Vol 3, Issue 2, 2018, Pages 673-675
Download Author Certificate
Please enter the email address corresponding to this article submission to download your certificate.
