Detecting and preventing unauthorised computer access on a physical network system
Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come within the internal network. These internal threats may come from...
Saved in:
Main Author: | Mohd. Shariff, Muhammad Reza |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2008
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/9572/1/SuhaizaMdSaadMFS2008.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
by: Al-Zarqawee, Aws Naser
Published: (2018) -
Account verification to prevent malicious users access in web-based forums
by: Tabar, Mahdi Taheri
Published: (2013) -
Trusted reasoning-role-based access control for cloud computing environment
by: Abdul Rauf, Abdul Rauf
Published: (2019) -
Alogrithm to prevent and detect insider multi transaction malicious activity in database
by: Khavidaki, Seyyed Mojtaba Dashti
Published: (2013) -
Anomaly intrusion detection system using immune network with reduced network traffic features
by: Qasem, Murad Abdo Rassam
Published: (2010)