Problem of Network Security Threats

被引:0
|
作者
Mendyk-Krajewska, Teresa [1 ]
Mazur, Zygmunt [1 ]
机构
[1] Wroclaw Univ Technol, Inst Informat, Wroclaw, Poland
来源
3RD INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION | 2010年
关键词
network; security; threats;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The development of computer networks is followed by a rapid evolution of threats to the security of their use. The phenomenon, though observed for years, has increased in the last period of time causing a growing problem to sustain an adequate level of security. New Internet threats utilize the latest techniques and Internet technologies. Computer crimes constitute a true challenge for software engineers and hardware producers as well as for users and all institutions responsible for the security of networks, including state institutions. Numerous world organizations supervise the issue of security. In the last period of time, the governments of many countries, including the European Parliament, have been working intensively on the laws concerning the network security.
引用
收藏
页码:436 / 443
页数:8
相关论文
共 50 条
  • [1] Virtual network security: threats, countermeasures, and challenges
    Bays, Leonardo Richter
    Oliveira, Rodrigo Ruas
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    Mauro Madeira, Edmundo Roberto
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6
  • [2] Threats to Security of Wireless Sensor Networks
    Tyagi, Akshat
    Kushwah, Juhi
    Bhalla, Monica
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 402 - 405
  • [3] Wireless Application Protocol for Potential Threats to Mobile Agent Network Security
    M. Indra Sena Reddy
    K. Subba Reddy
    P. J. Bhatt
    Rajeev Chetwani
    Journal of Electronic Science and Technology, 2012, (03) : 215 - 219
  • [4] The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures
    Lincy, N. L.
    Midhunchakkaravarthy
    SOFT COMPUTING FOR SECURITY APPLICATIONS, ICSCS 2022, 2023, 1428 : 107 - 117
  • [5] SECURITY THREATS AND ATTACKS IN CLOUD
    Mohammed, Asma
    Al Khathami, Jamilah
    Alhakami, Wajdi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (01): : 184 - 191
  • [6] International security after the cold war: utilization of the network technique to prioritize world threats
    Hamdy, M.
    Elshafey, M.
    El Hahm, A. O. Abd
    Safety and Security Engineering II, 2007, 94 : 109 - 118
  • [7] An optimized neural network for prediction of security threats on software testing
    Suman
    Khan, Raees Ahmad
    COMPUTERS & SECURITY, 2024, 137
  • [8] Mitigating Security Threats in Virtualized Environments
    Yauri, Bashir Aliyu
    Abah, Joshua
    International Journal of Computer Science and Network Security, 2016, 16 (01): : 101 - 108
  • [9] Mobile Payment Security, Threats, and Challenges
    Wang, Yong
    Hahn, Christen
    Sutrave, Kruttika
    PROCEEDINGS OF THE 2016 SECOND CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2016,
  • [10] Security Threats in Online Social Networks
    Sadeghian, Amirmohammad
    Zamani, Mazdak
    Shanmugam, Bharanidharan
    2013 INTERNATIONAL CONFERENCE ON INFORMATICS AND CREATIVE MULTIMEDIA (ICICM), 2013, : 254 - 258