ISSN 2321-3256 (Electronic Version)  
IJSRNSC News
Journal Contents
Current Issue
Archive Issues
Special Issues
Best Paper Award
IJSRNSC Guidelines
Author Guidelines
Editors Guidelines
Reviewer Guidelines
Research Areas
Process & Policies
Peer-Review Process
Plagiarism Policy
Correction Policy
Ethics and Malpractice
 Digital Certificate
       
    Regular Issues Certificate
    Special Issue Certificate
       
 Download
       
    IJSRNSC Template
    Copyright Transfer Form
    Originality Certificate
       
FAQs
 
Full Paper View
Open Access   Article

Delving into Security of Networks - Times Need
Annie Singla1 , Kamal Jain2 , Ajay Gairola3
Section:Research Paper, Product Type: Journal
Vol.2 , Issue.3 , pp.1-8, May-2014
Online published on Nov 01, 2014
Copyright © Annie Singla, Kamal Jain , Ajay Gairola . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  
Citation :
IEEE Style Citation: Annie Singla, Kamal Jain , Ajay Gairola, “Delving into Security of Networks - Times Need”, International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.3, pp.1-8, 2014.

MLA Style Citation: Annie Singla, Kamal Jain , Ajay Gairola "Delving into Security of Networks - Times Need." International Journal of Scientific Research in Network Security and Communication 2.3 (2014): 1-8.

APA Style Citation: Annie Singla, Kamal Jain , Ajay Gairola, (2014). Delving into Security of Networks - Times Need. International Journal of Scientific Research in Network Security and Communication, 2(3), 1-8.
           
3051 Views    3051 Downloads    3051 Downloads
Abstract :
Cyber space is an inevitable and indispensable place in every human beings life now. With the advent of Internet fad, the rapid digitization has taken place. But with the rapid digitization, there is a rapid increase in the occurrence of cyber disasters. Disasters are measured on two parameters-loss to life and property. In cyber disasters, there is a hell lot loss to money, zillions of people are getting affected on a daily basis and the loss of money is in billions of dollars in every disaster. They are bringing down the economy of the nation and people are also affecting on regular basis. Their privacy is being compromised. Due to the Internet fad, E-commerce, e-banking, online casinos are victimized. The vulnerability in the webpage of Gmail is found out during research study. The studies of vulnerability lead to cyber disasters using Phishing attacks through which the passwords were retrieved and accessed of various people. Users should be more aware as well as updated in terms of technology which can diminish these cyber disasters.
Key-Words / Index Term :
Phishing Attack, DDoS
References :
[1] Norton Report (2013). Available at (Retrieved on May, 2014)
[2] Karnika Seth (8th May 2010). IT Act 2000 vs 2008- Implementation, Challenges, and the Role of Adjudicating Officers. Available at (Retrieved 29th May,2014)
[3] 2013- The Impact of Cyber Crime. Available at (Retrieved on 23rd March,2014)
[4] EERI Special Earthquake Report — April 2005 global cyber war and crime: A conceptual framework * Bryan School of Business and Economics, The University of North Carolina at Greensboro, Bryan Building, Room: 368, P.O. Box 26165, Greensboro, NC 27402-6165, USA ,Received 14 December 2004; accepted 14 September 2005.
[5] Chris Welch(3rd October, 2013). Available at . (Retrieved on 29th Nov, 2013).
[6] Kounteya Sinha (28th Feb, 2014). Available at . (Retrieved on 14th April, 2014).
[7] Steven Musil (February 11, 2014). Available at < http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack-in-europe-hits-400gbps/> (Retrieved 23rd March,2014)
 
 
User Section
Login

If you do not have an account Click here for registration.
Email Id :   *
Password :   *
   
     
  Login 
     
New User?   Forgot Password
     
Authorization Required

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us atΒ  submit@ijsrnsc.org or view contact page for more details.

 Journal Statistics
UGC J. No. 46614
Citations 070
h-index 004
i10-index 001
IF Valune 2.422
 
 
 
 
Call for Reviewer
     Home l Terms & Conditions l Privacy Policy l
    © E-ISSN: 2321-3256 Copyright © IJSRNSC
This work is licensed under: CC-BY-NC-ND 4.0