CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES
Peer Review for material titled "CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES"
User Rating for material titled "CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES"
Member Comments for material titled "CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES"
Bookmark Collections for material titled "CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES"
Course ePortfolios for material titled "CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES"
Learning Exercises for material titled "CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES"
Accessibility Info for material titled "CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES"
Please enter a Bookmark title
Please limit Bookmark title to 65 characters
Please enter a description
Please limit Bookmark title to 4000 characters
A Bookmark with this title already existed.
Please limit a note about this material to 2048 characters

MERLOT II




        

Search > Material Results >

CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES

        

CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES

Logo for CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES
Information systems have occupied vital position in all spheres of activities whether it is business or scientific or governmental systems, correspondingly the challenges to the systems have also proliferated with the changing times. The paper discussed some of the present threats like malware, spam, denial of services, information theft, social networking and zero day exploits and the extent of damage which are caused by them. Thus, the need of a more secure and smooth environment is felt,... More
Material Type: Open Journal-Article
Technical Format: PDF
Date Added to MERLOT: March 29, 2010
Date Modified in MERLOT: November 22, 2010
Authors:
Send email to ssbdse@gmail.com
Keywords: Malware, Information Theft, Recent Threats to Security, Digital Rights Management (DRM), Collaborative Online Environments, Need For Security, Data Leakage Prevention (DLP), Cyber Espionage, Spam, Social Networking

Quality

  • Reviewed by members of Editorial board for inclusion in MERLOT.
    Editor Review (not reviewed)
  • User Rating (not rated)
  • Comments (none)
  • Learning Exercises (none)
  • Bookmark Collections (3)
  • Course ePortfolios (none)
  • Accessibility Info (none)

  • Rate this material
  • Create a learning exercise
  • Add accessibility information
  • Pick a Bookmark Collection or Course ePortfolio to put this material in or scroll to the bottom to create a new Bookmark Collection
    Name the Bookmark Collection to represent the materials you will add
    Describe the Bookmark Collection so other MERLOT users will know what it contains and if it has value for their work or teaching. Other users can copy your Bookmark Collection to their own profile and modify it to save time
    Edit the information about the material in this {0}
    Submitting Bookmarks...

About

Primary Audience: College General Ed, Graduate School, Professional
Mobile Compatibility: Not specified at this time
Language: English
Material Version: March 2010
Cost Involved: unsure
Source Code Available: no
Accessiblity Information Available: unsure
Creative Commons: unsure

Connections





QR Code for this Page

Browse in Categories

Discussion

Discussion for CHALLENGES OF NETWORK SECURITY AND COUNTERMEASURES

Log in to participate in the discussions or Register if you are not already a MERLOT member.

Return to Top of Page