ISSN 2321-3256 (Electronic Version)  
IJSRNSC News
Current Issue
Special Issues
Archive Issue
Best Paper Award
Author Guidelines
Editors Guidelines
Review Process
Research Areas
Plagiarism Policy
Correction Policy
Publication Ethics
Subscription
 Download
       
    Paper Format
    Copyright Transfer Form
    Digital Certificate
       
Indexing
FAQs
 
Full Paper View
Delving into Security of Networks - Times Need
Annie Singla1 , Kamal Jain2 , Ajay Gairola3
Section:Research Paper, Product Type: Journal
Vol.2 , Issue.3 , pp.1-8, May-2014
Online published on Nov 01, 2014
Copyright © Annie Singla, Kamal Jain , Ajay Gairola . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  
Citation :
IEEE Style Citation: Annie Singla, Kamal Jain , Ajay Gairola, “Delving into Security of Networks - Times Need”, International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.3, pp.1-8, 2014.

MLA Style Citation: Annie Singla, Kamal Jain , Ajay Gairola "Delving into Security of Networks - Times Need." International Journal of Scientific Research in Network Security and Communication 2.3 (2014): 1-8.

APA Style Citation: Annie Singla, Kamal Jain , Ajay Gairola, (2014). Delving into Security of Networks - Times Need. International Journal of Scientific Research in Network Security and Communication, 2(3), 1-8.
           
Abstract :
Cyber space is an inevitable and indispensable place in every human beings life now. With the advent of Internet fad, the rapid digitization has taken place. But with the rapid digitization, there is a rapid increase in the occurrence of cyber disasters. Disasters are measured on two parameters-loss to life and property. In cyber disasters, there is a hell lot loss to money, zillions of people are getting affected on a daily basis and the loss of money is in billions of dollars in every disaster. They are bringing down the economy of the nation and people are also affecting on regular basis. Their privacy is being compromised. Due to the Internet fad, E-commerce, e-banking, online casinos are victimized. The vulnerability in the webpage of Gmail is found out during research study. The studies of vulnerability lead to cyber disasters using Phishing attacks through which the passwords were retrieved and accessed of various people. Users should be more aware as well as updated in terms of technology which can diminish these cyber disasters.
Key-Words / Index Term :
Phishing Attack, DDoS
References :
[1] Norton Report (2013). Available at (Retrieved on May, 2014)
[2] Karnika Seth (8th May 2010). IT Act 2000 vs 2008- Implementation, Challenges, and the Role of Adjudicating Officers. Available at (Retrieved 29th May,2014)
[3] 2013- The Impact of Cyber Crime. Available at (Retrieved on 23rd March,2014)
[4] EERI Special Earthquake Report — April 2005 global cyber war and crime: A conceptual framework * Bryan School of Business and Economics, The University of North Carolina at Greensboro, Bryan Building, Room: 368, P.O. Box 26165, Greensboro, NC 27402-6165, USA ,Received 14 December 2004; accepted 14 September 2005.
[5] Chris Welch(3rd October, 2013). Available at . (Retrieved on 29th Nov, 2013).
[6] Kounteya Sinha (28th Feb, 2014). Available at . (Retrieved on 14th April, 2014).
[7] Steven Musil (February 11, 2014). Available at < http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack-in-europe-hits-400gbps/> (Retrieved 23rd March,2014)
 
 
User Section
Login

If you do not have an account Click here for registration.
Email Id :   *
Password :   *
   
     
  Login 
     
New User?   Forgot Password
     
Authorization Required

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us atΒ  submit@ijsrnsc.org or view contact page for more details.

Impact Factor
Year :  
 
 
 
 
Call for Reviewer
E-Publication

Publish Conference Souvenir/Proceeding, Thesis, Book with ISBN number

     Home l Terms & Conditions l Privacy Policy l
    © E-ISSN: 2321-3256 Copyright © IJSRNSC
This work is licensed under: CC-BY-NC-ND 4.0