Peer Reviewed

Network Security

If something is valuable, someone will try to steal it. This is certainly true for computer systems and the networks that connect them. These valuable resources are regularly subject to attack from individuals seeking to compromise both data and functionality of network assets. Protecting against threats requires understanding the types of attacks to which networked systems are exposed and the available means of protection. This technical article provides an introduction to common attacks with different types of protection. A number of publicised case histories are included to illustrate the damage that can be sustained by successful attacks and the importance of remaining protected against network threats.

Go to the profile of Martin Lee
Sep 28, 2016
0
0

Please sign in or register for FREE

Register to E&T Cyber Security Hub

E&T Cyber Security Hub brings together engineers and cyber security specialists to share practical know-how. With content created ‘by engineers, for engineers,’ it provides peer-reviewed technical information, real-world insights, lessons learnt and case studies, as well as tools for networking and knowledge-sharing, profiles of experts and the opportunity for companies to showcase their expertise.

Register

No comments yet.