Downloads: 2 | Views: 297 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper | Computer Science and Information Technology | India | Volume 11 Issue 8, August 2022 | Popularity: 4.9 / 10
Network Security and Ethical Hacking
Anjali V Prajapati, Vikram Patalbansi
Abstract: Networking enabled us to be connected to each other and devices thereby making it easy to interact with devices and people but it also can be used into compromising the privacy of its user and of the people connected to it. Network security is one of the major aspect to be considered also it is one of the most invested factor in an organization. With introduction of new technologies like internet of things, AI etc. besides making our life easier can also result in compromising it if not monitored and protected in a proper manner.
Keywords: Networking, Ethical hacking, Internet of things (IOT), Artificial intelligence, Network security, Computer network, SS7, Privacy concerns
Edition: Volume 11 Issue 8, August 2022
Pages: 578 - 579
DOI: https://www.doi.org/10.21275/SR22807161358
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Experimental Result Paper, Computer Science and Information Technology, Oman, Volume 12 Issue 4, April 2023
Pages: 1248 - 1251Ethical Hacking: Numerous Approaches to Spyware Detection and Prevention
Vijaya Bhaskar Reddy Muvva
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 5, May 2024
Pages: 518 - 527Sine Cosine Algorithm with Optimal Convolutional Autoencoder for Intrusion Detection and Classification Model
K. Hemavathi, Dr. R. Latha
Downloads: 4 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 11, November 2024
Pages: 1086 - 1090Generative Artificial Intelligence (GenAI) Use Cases for the Banks in India
Srihari Subudhi
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, India, Volume 13 Issue 6, June 2024
Pages: 494 - 498Mitigating Security Risks of Data Exposure in Unauthenticated IPFS Access with Blockchain Based Controls
Srivatsa Chetlur, Depavath Harinath
Downloads: 7 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Review Papers, Computer Science and Information Technology, United States of America, Volume 13 Issue 9, September 2024
Pages: 170 - 173Biometric Authentication: A Double-Edged Sword for Security?
Merlin Balamurugan