Problem of Network Security Threats

被引:0
|
作者
Mendyk-Krajewska, Teresa [1 ]
Mazur, Zygmunt [1 ]
机构
[1] Wroclaw Univ Technol, Inst Informat, Wroclaw, Poland
关键词
network; security; threats;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The development of computer networks is followed by a rapid evolution of threats to the security of their use. The phenomenon, though observed for years, has increased in the last period of time causing a growing problem to sustain an adequate level of security. New Internet threats utilize the latest techniques and Internet technologies. Computer crimes constitute a true challenge for software engineers and hardware producers as well as for users and all institutions responsible for the security of networks, including state institutions. Numerous world organizations supervise the issue of security. In the last period of time, the governments of many countries, including the European Parliament, have been working intensively on the laws concerning the network security.
引用
下载
收藏
页码:436 / 443
页数:8
相关论文
共 50 条
  • [31] Enhancing Network Security Strategies against External Threats to Civil Aircrafts
    Cao Quanxin
    Yan Linfang
    Chen Bin
    Fan Chenchen
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 110 - 115
  • [32] Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
    M Indra Sena Reddy
    K Subba Reddy
    P J Bhatt
    Rajeev Chetwani
    Journal of Electronic Science and Technology, 2012, 10 (03) : 215 - 219
  • [33] Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
    M. Indra Sena Reddy
    K. Subba Reddy
    P. J. Bhatt
    Rajeev Chetwani
    Journal of Electronic Science and Technology, 2012, (03) : 215 - 219
  • [34] Detecting security threats in the network core using Data Mining techniques
    Sandford, P. J.
    Parish, D. J.
    Sandford, J. M.
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 951 - 954
  • [35] Assessment of Security Threats via Network Topology Analysis: An Initial Investigation
    Trovati, Marcello
    Thomas, Win
    Sun, Quanbin
    Kontonatsios, Georgios
    GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 416 - 425
  • [36] Soft Security Threats and European Security
    Watanabe, Lisa
    JOURNAL OF CONTEMPORARY EUROPEAN STUDIES, 2006, 14 (02) : 273 - 275
  • [37] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [38] The threats to food security
    Korneiko, Olga V.
    Rogaleva, Nadezhda L.
    AMAZONIA INVESTIGA, 2018, 7 (16): : 232 - 242
  • [39] TOP SECURITY THREATS
    KAY, R
    BYTE, 1995, 20 (04): : 94 - 94
  • [40] Countering security threats
    Rhodes, Ella
    PSYCHOLOGIST, 2016, 29 (01) : 14 - 14