Open Access Open Access  Restricted Access Subscription or Fee Access

A Review of Network Security Analysis

Ashwani Wantoo, Priya Kushwaha

Abstract


Now-a-days computer network, in general, develop over size expanding vulnerable purposes of system. To survey the dependability and security of PC network, one probably won't comprehend those purposes of powerlessness with high volumes of produced reports. With complex systems set up and increment in populace of versatile system hubs, the report may almost certainly transform into pages of information than data as the issues can't be tended to at a solitary go.

Keywords: VS Scan, STUXNET (an internet worm), MulVAL.

Full Text:

PDF

References


Ilmola-Sheppard L. Case Study: Seven Shocks and Finland. Innovation and Supply Chain Management. 2013; 7(3): 112–124p.

Zetter K. An Unprecedented Look at Stuxnet, the World’s First Digital Weapon. Wired, 2014; 3.

Leyden J. Hack on Saudi Aramco Hit 30,000 Workstations Oil Firm Admits. The Register, 2012; 29.

Elkins P. Inside the Hack of the Century. Fortune.com, June 25, 2015; Robert Mclean. Hospital Pays Bitcoin Ransom After Malware Attack. CNN Money, Feb 17, 2016.

Tsai O. How I Hacked Facebook, and Found Someone’s Backdoor Script. DEVCORE Blog, April 21, 2016.

Menn J. Secret Contract Tied NSA and Security Industry Pioneer. Reuters. Dec 20, 2013.




DOI: https://doi.org/10.37628/ijosct.v4i2.433

Refbacks

  • There are currently no refbacks.