Abstract

A RESEARCH HONEYPOT TO UNCOVER TOOLS AND TACTICS OF BLACKHAT COMMUNITY

M.K. Chandrasekaran , Dr. Pardeep Goal

001-005

Vol: 1, Issue: 3, 2011

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and overseeing operations being done.

Download PDF

    References

  1. Ross J. Anderson: Security Engineering: A Guide to Building Dependable Distributed Systems, ISBN 0-471-38922-6
  2. Morrie Gasser: Building a secure computer system ISBN 0-442-23022-2 1988
  3. Stephen Haag, Maeve Cummings, Donald McCubbrey, Alain Pinsonneault, Richard Donovan: Management Information Systems for the information age, ISBN 0-07-091120-7
  4. E. Stewart Lee: Essays about Computer Security Cambridge, 1999
  5. Peter G. Neumann: Principled Assuredly Trustworthy Composable Architectures 2004
  6. Paul A. Karger, Roger R. Schell: Thirty Years Later: Lessons from the Multics Security Evaluation, IBM white paper
  7. Bruce Schneier: Secrets & Lies: Digital Security in a Networked World, ISBN 0-471- 25311-1
  8. Robert C. Seacord: Secure Coding in C and C++. Addison Wesley, September, 2005. ISBN 0-321-33572-4
  9. Clifford Stoll: Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, Pocket Books, ISBN 0-7434-1146-3
  10. Network Infrastructure Security, Angus Wong and Alan Yeung, Springer, 2009.
Back

Disclaimer: Indexing of published papers is subject to the evaluation and acceptance criteria of the respective indexing agencies. While we strive to maintain high academic and editorial standards, International Journal of Research in Science and Technology does not guarantee the indexing of any published paper. Acceptance and inclusion in indexing databases are determined by the quality, originality, and relevance of the paper, and are at the sole discretion of the indexing bodies.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.