اختيار كلية تمريض البصرة كمركز لهيئة البورد العربي لطب الاسرة/البصرة
   |   
كلية التمريض الدراسات المسائية تواصل استقبالها للطلبة الجدد للدراسات المسائية للعام الدراسي الجديد 2016-2017
   |   
جامعة البصرة تجري اختبار للمتدربين على برنامج مايكروسوفت اسيس
   |   
جامعة البصرة تحتضن معرضا فنيا عن شهداء الحشد الشعبي
   |   
حصول تدريسي في جامعة البصرة على عضوية المجلة الأميركية للذكاء الصناعي
   |   

Available online at http://www.journalcra.com

INTERNATIONAL JOURNAL

OF CURRENT RESEARCH

 

International Journal of Current Research

Vol. 5, Issue, 01, pp.006-013, January, 2013

 

ISSN: 0975-833X

RESEARCH ARTICLE

 

 

 

 Attcack and Saving Network from Attack

 *Luaay Abdulwahed

 

College of nursing, Basra University, Iraq *Corresponding author: عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته., عنوان البريد الإلكتروني هذا محمي من روبوتات السبام. يجب عليك تفعيل الجافاسكربت لرؤيته.


ARTICLE INFO

Article History:

 Received 25th October, 2012 Received in revised form 28th November, 2012 Accepted 7th December, 2012

 Published online 16th January, 2013

 

ABSTRACT

This paper takes a keen look in network security and network security goals, why computers are insecure and type Of attack, how to improve network security . Securing your network and practical's what is Quota.


 

Key words:

 

 

DOS/IP/ICMP/TCP/UDP/

 

 

DNS/HTTP

Copy Right, IJCR, 2012, Academic Journals. All rights reserved.

 

 

 

INTRODUCTION

 Network security comprises the measures a company takes to protect its computer system, and it is a prime concern for every company that uses computers. Compromised network security means a hacker or competitor may gain access to critical or sensitive data, possibly resulting in data loss, or even complete destruction of the system .

 

Network Security Goals 

   Confidentiality: only sender, intended receiver should “understand” message contents sender encrypts message receiver decrypts message Privacy: hide `who is doing what with whom

Authentication: sender, receiver want to conform identity of each other

Integrity: sender, receiver want to ensure messages are not altered (in transit, or afterwards) without detection

 Access and Availability: services must be accessible and available to users Network Security

 

Why Computers are Insecure ?

 Most PCs use insecure Ross

 

Most designed for `home` - security not a goal Others support separation between users

Few/none restrict capabilities of applications

 

Malicious / vulnerable / buggy app can harm all!!

 PCs run buggy, vulnerable, even malicious code Many sources (libraries, shareware, …)

 Limited awareness & tools.

 Limited product liability and consequent damages Most computers don’t fix known vulnerabilities


007                     International Journal of Current Research, Vol. 5, Issue, 01, pp.006-013, January, 2013

008                     International Journal of Current Research, Vol. 5, Issue, 01, pp.006-013, January, 2013

Thank you for evaluating 

BCL easyConverter Desktop

This Word document was converted from PDF with an evaluation version of BCL easyConverter Desktop software that only converts the first 3 pages of your PDF.

 

Activate your software for less than $20
http://www.pdfonline.com/easyconverter/

 

 

Text Box: Activate your software for less than $20http://www.pdfonline.com/easyconverter/

CTRL+ Click on the link below to purchase

دخول