Abstract

A RESEARCH HONEYPOT TO UNCOVER TOOLS AND TACTICS OF BLACKHAT COMMUNITY

M.K. Chandrasekaran , Dr. Pardeep Goal

001-005

Vol: 1, Issue: 3, 2011

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done.

Download PDF

    References

  1. Ross J. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems, ISBN 0-471-38922-6
  2. Morrie Gasser: Building a secure computer system ISBN 0-442-23022-2 1988
  3. Stephen Haag, Maeve Cummings, Donald McCubbrey, Alain Pinsonneault, Richard Donovan: Management Information Systems for the information age, ISBN 0-07-091120-7
  4. E. Stewart Lee: Essays about Computer Security Cambridge, 1999
  5. Peter G. Neumann: Principled Assuredly Trustworthy Composable Architectures 2004
  6. Paul A. Karger, Roger R. Schell: Thirty Years Later: Lessons from the Multics Security Evaluation, IBM white paper
  7. Bruce Schneier: Secrets & Lies: Digital Security in a Networked World, ISBN 0-471- 25311-1
  8. Robert C. Seacord: Secure Coding in C and C++. Addison Wesley, September, 2005. ISBN 0-321-33572-4
  9. Clifford Stoll: Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, Pocket Books, ISBN 0-7434-1146-3
  10. Network Infrastructure Security, Angus Wong and Alan Yeung, Springer, 2009.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.