Problem of Network Security Threats

被引:0
|
作者
Mendyk-Krajewska, Teresa [1 ]
Mazur, Zygmunt [1 ]
机构
[1] Wroclaw Univ Technol, Inst Informat, Wroclaw, Poland
关键词
network; security; threats;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The development of computer networks is followed by a rapid evolution of threats to the security of their use. The phenomenon, though observed for years, has increased in the last period of time causing a growing problem to sustain an adequate level of security. New Internet threats utilize the latest techniques and Internet technologies. Computer crimes constitute a true challenge for software engineers and hardware producers as well as for users and all institutions responsible for the security of networks, including state institutions. Numerous world organizations supervise the issue of security. In the last period of time, the governments of many countries, including the European Parliament, have been working intensively on the laws concerning the network security.
引用
下载
收藏
页码:436 / 443
页数:8
相关论文
共 50 条
  • [1] Bot armies as threats to network security
    Banks, Sheila B.
    Stytz, Martin R.
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2007, 2007, 6570
  • [2] To the problem of external threats to the security of the Russian Federation
    Petrov, V. V.
    LEGAL SCIENCE AND PRACTICE-BULLETIN OF NIZHNIY NOVGOROD ACADEMY OF THE MINISTRY IF THE INTERIOR OF RUSSIA, 2009, 10 (01): : 30 - 34
  • [3] Virtual network security: threats, countermeasures, and challenges
    Bays, Leonardo Richter
    Oliveira, Rodrigo Ruas
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    Mauro Madeira, Edmundo Roberto
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6
  • [4] Protecting against threats to enterprise network security
    Department of Accounting and Information Technology, York College, City University of New York, United States
    Software World, 2006, 2 (14-15):
  • [5] Wireless network security: Vulnerabilities, threats and countermeasures
    Choi, Min-Kyu
    Robles, Rosslin John
    Hong, Chang-Hwa
    Kim, Tai-Hoon
    International Journal of Multimedia and Ubiquitous Engineering, 2008, 3 (03): : 77 - 86
  • [6] Security and privacy threats in RFID traceability network
    Chu Chao-Hsien
    Journal of Southeast University(English Edition), 2008, (English Edition) : 132 - 135
  • [8] Cognitive Radio Network Security Threats: A Review
    Mishra, Nikita
    Srivastava, Sumit
    Sharan, Shivendra Nath
    2019 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMMUNICATION AND COMPUTATIONAL TECHNIQUES (ICCT), 2019, : 333 - 338
  • [9] Network mobility (NEMO) security: Threats and solutions
    Dinakaran, M.
    Balasubramanie, P.
    Journal of Theoretical and Applied Information Technology, 2012, 35 (01) : 77 - 82
  • [10] A Survey of Network Traffic Visualization in Detecting Network Security Threats
    Liu, Xiaomei
    Sun, Yong
    Fang, Liang
    Liu, Junpeng
    Yu, Lingjing
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 91 - 98