Coping with Home Network Security Threats

2003 ◽  
pp. 595-598
Author(s):  
MADHAVI DHINGRA ◽  
DEEPIKA SRIVASTAVA ◽  
VIPUL SHARMA

With continual advances in technology, wireless accessibility is being deployed increasingly in office and public environments, as it is having huge benefits. But it is also coupled with the security threats and risks that will adversely affect the performance of the organization. To get rid of these threats, firstly these threats need to be understood and then their solutions need to be finding out. This paper discusses major security threats and describes their solutions for securing wireless network.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042084
Author(s):  
Xi Wang ◽  
Lei Shi

Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.


Repositor ◽  
2020 ◽  
Vol 2 (4) ◽  
pp. 475
Author(s):  
Ilfan Arif Romadhan ◽  
Syaifudin Syaifudin ◽  
Denar Regata Akbi

ABSTRAKPerlindungan terhadap keamanan jaringan merupakan hal yang sangat penting untuk dilakukan. Mengingat kemudahan dalam mengakses jaringan memungkinkan adanya gangguan dari pihak yang ingin menyerang, merusak, bahkan mengambil data penting. Honeypot memang tidak menyelesaikan masalah pada keamanan jaringan, namun honeypot membuat penelitian tentang serangan menjadi lebih sederhana dengan konsep yang mudah untuk dimengerti dan dimplementasikan. Penelitian ini menerapkan beberapa honeypot menggunakan Raspberry pi dan ELK stack untuk monitoring hasil yang didapatkan oleh honeypot. Tujuan dari penelitian ini untuk merancang sistem yang mampu mendeteksi serangan pada jaringan menggunakan honeypot. Raspberry pi digunakan sebagai sensor honeypot untuk pemantauan ancaman keamanan terbukti hemat biaya dan efektif menggantikan komputer desktop. ELK stack memudahkan pemusatan data dari berbagai sumber dan membuat analisis log yang awalnya rumit untuk dianalisis menjadi lebih menarik.ABSTRACTProtection of network security is very important to do. Given the ease in accessing the network allows for interference from parties who want to attack, destroy, and even retrieve important data. Honeypot does not solve the problem on network security, but the honeypot makes research about attacks become simpler with concepts that are easy to understand and implement. This research applies some honeypot using Raspberry pi and ELK stack for monitoring result obtained by honeypot. The purpose of this research is to design a system capable of detecting attacks on a network using a honeypot. Raspberry pi is used as a honeypot sensor for monitoring proven cost-effective and cost-effective security threats to replace desktop computers. The ELK stack facilitates the convergence of data from multiple sources and makes log analysis initially complex for analysis to be more interesting.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


Author(s):  
Hoseong Jeon ◽  
Min Young Chung ◽  
Jaehyoun Kim ◽  
Hyunseung Choo

Author(s):  
Leonardo Richter Bays ◽  
Rodrigo Ruas Oliveira ◽  
Marinho Pilla Barcellos ◽  
Luciano Paschoal Gaspary ◽  
Edmundo Roberto Mauro Madeira

Sign in / Sign up

Export Citation Format

Share Document