Detecting and preventing unauthorised computer access on a physical network system
Threats are nuisance to the information technology world. Today we have different kind of threats which includes, hacking, viruses and sniffing. However most threats in information technology systems come within, whereby threats come within the internal network. These internal threats may come from...
محفوظ في:
المؤلف الرئيسي: | Mohd. Shariff, Muhammad Reza |
---|---|
التنسيق: | أطروحة |
اللغة: | English |
منشور في: |
2008
|
الموضوعات: | |
الوصول للمادة أونلاين: | http://eprints.utm.my/id/eprint/9572/1/SuhaizaMdSaadMFS2008.pdf |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
مواد مشابهة
-
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
بواسطة: Al-Zarqawee, Aws Naser
منشور في: (2018) -
Account verification to prevent malicious users access in web-based forums
بواسطة: Tabar, Mahdi Taheri
منشور في: (2013) -
Trusted reasoning-role-based access control for cloud computing environment
بواسطة: Abdul Rauf, Abdul Rauf
منشور في: (2019) -
Alogrithm to prevent and detect insider multi transaction malicious activity in database
بواسطة: Khavidaki, Seyyed Mojtaba Dashti
منشور في: (2013) -
Anomaly intrusion detection system using immune network with reduced network traffic features
بواسطة: Qasem, Murad Abdo Rassam
منشور في: (2010)