dc.contributor.author |
Adhikarinayake, CK |
|
dc.contributor.author |
Baddegama, VW |
|
dc.contributor.author |
Bandara, GM |
|
dc.contributor.author |
Erabadda, ELBH |
|
dc.contributor.author |
Senarathna, MSR |
|
dc.date.accessioned |
2022-12-14T07:04:19Z |
|
dc.date.available |
2022-12-14T07:04:19Z |
|
dc.date.issued |
2012 |
|
dc.identifier.citation |
****** |
en_US |
dc.identifier.uri |
http://dl.lib.uom.lk/handle/123/19782 |
|
dc.description.abstract |
ConP^rs have replaced majority of file based systems. File shareing has become essntional for any company and for any individual with incerasing usuage of technology. systems to be successful. In this paper we have discussed how security of computer based systems can be threatened due to vanous reasons and how these threats can be minimized adopting various methodologies. We bring up current solutions implemented in the current world and some new the oretical designs. The paper is mainly focuses on the users at the endpoints of the network. The security aspect related to provide secured connections between them (data encryption, etc.) is not discussed in the paper. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Department of Computer Science and Engineering, University of Moratuwa. |
en_US |
dc.subject |
Network security |
en_US |
dc.subject |
Protection |
en_US |
dc.subject |
Network crimes |
en_US |
dc.title |
Network security: analysis of network crimes and data protection methodologies |
en_US |
dc.type |
Conference-Full-text |
en_US |
dc.identifier.faculty |
Engineering |
en_US |
dc.identifier.department |
Department of Computer Science and Engineering |
en_US |
dc.identifier.year |
2012 |
en_US |
dc.identifier.conference |
CSE Symposium 2014 |
en_US |
dc.identifier.pgnos |
pp. 113-118 |
en_US |
dc.identifier.proceeding |
Proceedings of the CSE Symposium 2014 |
en_US |