Open Access Open Access  Restricted Access Subscription or Fee Access

Network Security

Dr. T. Deepa, R. Malliga, R. Aishwarya


For the first few decades of their existence, computer networks were primarily used by university researchers for sending e-mail and by corporate employees for sharing printers. Under these conditions, security did not get a lot of attention. But now, as millions of ordinary citizens are using networks for banking, shopping, and filing their tax returns, network security is looming on the horizon as a potentially.


Internet of Thing, Network Connectivity, Spoofing, Social Engineering, Eavesdropping.

Full Text:


References network_security


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.