2020
DOI: 10.1007/978-981-15-9317-8_1
|View full text |Cite
|
Sign up to set email alerts
|

Introduction to Network Security Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…• Firewall: Firewalls are created to provide an effective deterrent towards hackers' attempts to illegally access a computer upon its connection to the internet or to other network connections [65,66]. Most operating systems are equipped with a firewall and the firewall is turned on by default.…”
Section: Cybersecurity Tools and Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…• Firewall: Firewalls are created to provide an effective deterrent towards hackers' attempts to illegally access a computer upon its connection to the internet or to other network connections [65,66]. Most operating systems are equipped with a firewall and the firewall is turned on by default.…”
Section: Cybersecurity Tools and Techniquesmentioning
confidence: 99%
“…Most operating systems are equipped with a firewall and the firewall is turned on by default. In addition to the default firewall, users could also install commercial firewalls if the default firewall does not provide sufficient protection or if it interferes with the user's legitimate network activities [65,66].…”
Section: Cybersecurity Tools and Techniquesmentioning
confidence: 99%
“…They work by displaying pop-up ads both when running other applications and when idle. Similarly to spyware, adware is most often bundled with free programs downloaded from the web [ 193 ].…”
Section: Social Engineering Attacks and Countermeasuresmentioning
confidence: 99%
“…They are usually used for activities such as sending e-mails or destroying files on the disk. Such activities consume the bandwidth of networks and devices, making the latter often become very slow and even stop responding to commands [ 193 ].…”
Section: Social Engineering Attacks and Countermeasuresmentioning
confidence: 99%
“…In this section, we present the seven most significant IoT-related security problems, ranging from theft of IoT devices to prospective burglaries to the perils of uncontrolled devices [88].…”
Section: Iot Security Issuesmentioning
confidence: 99%