scholarly journals Enhancing the Network Security Using Multilayer Security Features

Author(s):  
Deepinder Singh Sran ◽  
Sheenu Sachdeva

With the occurrence of the World Wide Web and the emergence of ecommerce applications and social networks, organizations across the world generate a large amount of data daily. Information security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Also network security issues are now becoming important as society is moving towards digital information age. As more and more users connect to the internet it attracts a lot of cyber-attacks. It required to protect computer and network security i.e. the critical issues. The pernicious hubs make an issue in the system. It can utilize the assets of different hubs and safe guard the assets of its own. In this paper we provide an overview on Network Security and various techniques through which Network Security can be enhanced i.e. Cryptography. Cryptography and Network Security is used to protect network and data transmission takes place over wireless network.

Author(s):  
Joachim K. Rennstich

The new information age has the potential not only to alter the historical path of world system development, as other socio-technological paradigmatic shifts have done, but also to transform it substantially. One school of thought argues for a complete upending of past patterns with nation states in their hierarchical alignment as the center core and periphery of power in this system. An alternative view instead argues that the regularized interaction that characterizes a world system may envisage a number of modes of production without altering its fundamental structure. The world system in this view is made up of a variety of complex intra-organizational and interorganizational networks intersecting with geographical networks structured particularly around linked clusters of socioeconomic activity. Information and carrier technologies based on new forms of information technologies and their connection to network technologies play a vital role in the long-term evolution of world system development characterized by both path-dependencies and major transformations that result from technological innovations. While digital information technologies significantly alter the processing and use of information as a central element of power and control within this network structure and therefore its network logic, they do not break the evolutionary process of world system development.


Author(s):  
R. Subhashini ◽  
V.Jawahar Senthil Kumar

The World Wide Web is a large distributed digital information space. The ability to search and retrieve information from the Web efficiently and effectively is an enabling technology for realizing its full potential. Information Retrieval (IR) plays an important role in search engines. Today’s most advanced engines use the keyword-based (“bag of words”) paradigm, which has inherent disadvantages. Organizing web search results into clusters facilitates the user’s quick browsing of search results. Traditional clustering techniques are inadequate because they do not generate clusters with highly readable names. This paper proposes an approach for web search results in clustering based on a phrase based clustering algorithm. It is an alternative to a single ordered result of search engines. This approach presents a list of clusters to the user. Experimental results verify the method’s feasibility and effectiveness.


Author(s):  
Tziporah Stern

Privacy, or the right to hold information about oneself in secret (Masuda, 1979; O’Brien & Yasnof, 1999), has become increasingly important in the information society. With the rapid technological advances and the digitalization of information, retrieval of specific records is more rapid; personal information can be integrated into a number of different data files; and copying, transporting, collecting, storing, and processing large amounts of information is easier. Additionally, the advent of the World Wide Web and the fast-paced growth of the Internet have created further cause for concern. The vast amounts of digital information and the pervasiveness of the Internet facilitate new techniques for gathering information—for example, spyware, phishing, and cookies. Hence, personal information is much more vulnerable to being inappropriately used. This article outlines the importance of privacy in an e-commerce environment, the specific privacy concerns individuals may have, antecedents to these concerns, and potential remedies to quell them.


Author(s):  
Esharenana E. Adomi

The World Wide Web (WWW) has led to the advent of the information age. With increased demand for information from various quarters, the Web has turned out to be a veritable resource. Web surfers in the early days were frustrated by the delay in finding the information they needed. The first major leap for information retrieval came from the deployment of Web search engines such as Lycos, Excite, AltaVista, etc. The rapid growth in the popularity of the Web during the past few years has led to a precipitous pronouncement of death for the online services that preceded the Web in the wired world.


Author(s):  
Madeline Carr

When The Anarchical Society was published in 1977, the world was on the doorstep of seismic technological change. Forty years later, the information age has placed cyber security at the centre of many global political concerns including armed conflict and international law. The ongoing difficulties associated with accurately attributing cyber attacks introduce a new dimension of anarchy in international relations. This essay draws on Bull’s ideas about social interplay to explore the problem of attribution in cyberspace. It finds that the difficulties of identifying (even) state actors undermine some of the processes and institutions upon which Bull based his ideas. However, it also finds that Bull’s work is useful in unpicking exactly why attribution is so problematic for international relations. Ultimately, Bull’s expectation that actors will look for social solutions to maintain order appears to be holding up in the information age much as it did in the industrial age.


Author(s):  
Mario A. Maggioni ◽  
Mike Thelwall ◽  
Teodora Erika Uberti

The Internet is one of the newest and most powerful media that enables the transmission of digital information and communication across the world, although there is still a digital divide between and within countries for its availability, access, and use. To a certain extent, the level and rate of Web diffusion reflects its nature as a complex structure subject to positive network externalities and to an exponential number of potential interactions among individuals using the Internet. In addition, the Web is a network that evolves dynamically over time, and hence it is important to define its nature, its main characteristics, and its potential.


Author(s):  
Ana-Maria CERNOV

Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. This paper presents the main issues regarding the network security issues and solutions to fight back the cyber-attacks.


2018 ◽  
Vol 2 (5) ◽  
Author(s):  
Yuantian Zhang ◽  
Wei Yang ◽  
Zhongxi Zhang

Abstract: In the context of the information age, on the basis of the convenience of computer networks, security issues have gradually emerged. The data encryption technology is reasonably applied in the process of computer network security practice, which promotes the safe and reliable operation of the computer network to a certain extent. Based on this, our article regards data encryption technology as the main research object, focusing on its specific application in computer network security.


2018 ◽  
Author(s):  
Joachim Karl Rennstich

The new information age has the potential to not only alter the historical path of world system development as other socio-technological paradigmatic shifts have done, but to transform it substantially. One school of thought argues for a complete upending of past patterns with nation-states in their hierarchical alignment as the center core and periphery of power in this system. An alternative view instead argues that the regularized interaction that characterizes a world system may envisage a number of modes of production without altering its fundamental structure). The world system in this view is made up of a variety of complex intraorganizational and interorganizational networks intersecting with geographical networks structured particularly around linked clusters of socioeconomic activity. Information and carrier technologies based on new forms of information technologies and their connection to network technologies play a vital role in the long-term evolution of world system development characterized by both path-dependencies and major transformations that result from technological innovations. While digital information technologies significantly alter the processing and use of information as a central element of power and control within this network structure and therefore its network logic, they do not break the evolutionary process of world system development.


Author(s):  
Disha Satyan Dahanukar ◽  
Durva Sanjay Shelke

With the explosively growing internet that has been merging with our lives for the past few decades, data and network security has been of utmost importance as society moves towards the age of digital information. As the number of users connected to the web increases, the threat faced by the network because of attackers also increases. Cryptography, the science of information security derived from the inherent needs of humans to converse and share information or communicate selectively at times, has the primary function of sending correct data over the network without any undesirable modifications. In cryptography, the original message is masked or encrypted by the sender and has to be decoded or decrypted by the receiver using a predefined set of algorithms decided before the commencement of the data transmission. Thereby, successfully avoiding redundant people from accessing or understanding the message as it is converted to content unreadable by the human eye.


Sign in / Sign up

Export Citation Format

Share Document