NETWORK SECURITY ISSUES

被引:1
|
作者
HALLIDEN, P
机构
[1] Zergo Consultants Ltd, Millbank House, Hartley Wintney, Hants RG27 8PE, High Street
关键词
encryption; network management; security services;
D O I
10.1016/0140-3664(90)90090-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Increasingly, distributed processing is used to achieve the availability and processing power required by today's information technology systems. Networks are an important element in this drive towards more responsive systems. These systems can vary in size from a few desk top machines connected together in a single office to a complex of mainframes, controllers and terminals owned by a variety of organizations worldwide. It is shown that much work has been done to establish the security services that can be provided to users of these networks. If these services are to achieve their desired level of service, however, careful attention must be paid to the way they are planned, implemented and, in particular, the way in which they are managed.
引用
收藏
页码:626 / 629
页数:4
相关论文
共 50 条
  • [31] Security issues in Wireless Sensor Network Broadcast Authentication
    Raza, Asad
    Abu Romman, Ali
    Qureshi, Muhammad Faheem
    2019 2ND INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2019, : 195 - 201
  • [32] Cognitive Femtocell Network Various Challenges and Security Issues
    Tarte, Priya
    Hanchate, Seema
    2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 1 - 5
  • [33] Performance of automated network vulnerability scanning at remediating security issues
    Holm, Hannes
    COMPUTERS & SECURITY, 2012, 31 (02) : 164 - 175
  • [34] Privacy and security issues in a wide area health communications network
    Neame, R
    INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1996, 43 (1-2): : 123 - 127
  • [35] China's Financial Market Security Issues in Network Times
    Shen Jianyong
    Qiu Lisheng
    PROCEEDINGS OF THE 4TH (2012) INTERNATIONAL CONFERENCE ON FINANCIAL RISK AND CORPORATE FINANCE MANAGEMENT, VOLS I AND II, 2012, : 116 - +
  • [36] Peer-to-Peer Network Security Issues and Analysis: Review
    Alharbi, Adel R.
    Aljaedi, Amer
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (11): : 74 - 88
  • [37] A systematic review on security issues in vehicular ad hoc network
    Tanwar, Sudeep
    Vora, Jayneel
    Tyagi, Sudhanshu
    Kumar, Neeraj
    Obaidat, Mohammad S.
    SECURITY AND PRIVACY, 2018, 1 (05):
  • [38] Security Issues in Cooperative Spectrum Sensing for Cognitive Radio Network
    Du, Jiang
    Zhu, Chunjiao
    Chen, Zhaohui
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [39] Practical overview of security issues in wireless sensor network applications
    Radhappa H.
    Pan L.
    Xi Zheng J.
    Wen S.
    International Journal of Computers and Applications, 2018, 40 (04) : 202 - 213
  • [40] The Application of Blockchain Technology in Network Security and Authentication: Issues and Strategies
    Lu, Yanli
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (07) : 1103 - 1113