Full Paper View

Delving into Security of Networks - Times Need

Annie Singla1 , Kamal Jain2 , Ajay Gairola3

Section:Research Paper, Product Type: Journal
Vol.2 , Issue.3 , pp.1-8, May-2014

Online published on Nov 01, 2014


Copyright © Annie Singla, Kamal Jain , Ajay Gairola . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

Citation :
IEEE Style Citation: Annie Singla, Kamal Jain , Ajay Gairola, “Delving into Security of Networks - Times Need”, International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.3, pp.1-8, 2014.

MLA Style Citation: Annie Singla, Kamal Jain , Ajay Gairola "Delving into Security of Networks - Times Need." International Journal of Scientific Research in Network Security and Communication 2.3 (2014): 1-8.

APA Style Citation: Annie Singla, Kamal Jain , Ajay Gairola, (2014). Delving into Security of Networks - Times Need. International Journal of Scientific Research in Network Security and Communication, 2(3), 1-8.

3175 Views    3114 Downloads    3102 Downloads
  
  

Abstract :
Cyber space is an inevitable and indispensable place in every human beings life now. With the advent of Internet fad, the rapid digitization has taken place. But with the rapid digitization, there is a rapid increase in the occurrence of cyber disasters. Disasters are measured on two parameters-loss to life and property. In cyber disasters, there is a hell lot loss to money, zillions of people are getting affected on a daily basis and the loss of money is in billions of dollars in every disaster. They are bringing down the economy of the nation and people are also affecting on regular basis. Their privacy is being compromised. Due to the Internet fad, E-commerce, e-banking, online casinos are victimized. The vulnerability in the webpage of Gmail is found out during research study. The studies of vulnerability lead to cyber disasters using Phishing attacks through which the passwords were retrieved and accessed of various people. Users should be more aware as well as updated in terms of technology which can diminish these cyber disasters.

Key-Words / Index Term :
Phishing Attack, DDoS

References :
[1] Norton Report (2013). Available at (Retrieved on May, 2014)
[2] Karnika Seth (8th May 2010). IT Act 2000 vs 2008- Implementation, Challenges, and the Role of Adjudicating Officers. Available at (Retrieved 29th May,2014)
[3] 2013- The Impact of Cyber Crime. Available at (Retrieved on 23rd March,2014)
[4] EERI Special Earthquake Report — April 2005 global cyber war and crime: A conceptual framework * Bryan School of Business and Economics, The University of North Carolina at Greensboro, Bryan Building, Room: 368, P.O. Box 26165, Greensboro, NC 27402-6165, USA ,Received 14 December 2004; accepted 14 September 2005.
[5] Chris Welch(3rd October, 2013). Available at . (Retrieved on 29th Nov, 2013).
[6] Kounteya Sinha (28th Feb, 2014). Available at . (Retrieved on 14th April, 2014).
[7] Steven Musil (February 11, 2014). Available at < http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack-in-europe-hits-400gbps/> (Retrieved 23rd March,2014)

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us atΒ  editor@isroset.org or view contact page for more details.

Impact Factor

Journals Contents

Author & Reviewer

Download

Digital Certificate

Go to Navigation