Full Paper View Go Back
Delving into Security of Networks - Times Need
Annie Singla1 , Kamal Jain2 , Ajay Gairola3
Section:Research Paper, Product Type: Journal
Vol.2 ,
Issue.3 , pp.1-8, May-2014
Online published on Nov 01, 2014
Copyright © Annie Singla, Kamal Jain , Ajay Gairola . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Annie Singla, Kamal Jain , Ajay Gairola, “Delving into Security of Networks - Times Need,” International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.3, pp.1-8, 2014.
MLA Style Citation: Annie Singla, Kamal Jain , Ajay Gairola "Delving into Security of Networks - Times Need." International Journal of Scientific Research in Network Security and Communication 2.3 (2014): 1-8.
APA Style Citation: Annie Singla, Kamal Jain , Ajay Gairola, (2014). Delving into Security of Networks - Times Need. International Journal of Scientific Research in Network Security and Communication, 2(3), 1-8.
BibTex Style Citation:
@article{Singla_2014,
author = {Annie Singla, Kamal Jain , Ajay Gairola},
title = {Delving into Security of Networks - Times Need},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {5 2014},
volume = {2},
Issue = {3},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {1-8},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=144},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=144
TI - Delving into Security of Networks - Times Need
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Annie Singla, Kamal Jain , Ajay Gairola
PY - 2014
DA - 2014/11/01
PB - IJCSE, Indore, INDIA
SP - 1-8
IS - 3
VL - 2
SN - 2347-2693
ER -
Abstract :
Cyber space is an inevitable and indispensable place in every human beings life now. With the advent of Internet fad, the rapid digitization has taken place. But with the rapid digitization, there is a rapid increase in the occurrence of cyber disasters. Disasters are measured on two parameters-loss to life and property. In cyber disasters, there is a hell lot loss to money, zillions of people are getting affected on a daily basis and the loss of money is in billions of dollars in every disaster. They are bringing down the economy of the nation and people are also affecting on regular basis. Their privacy is being compromised. Due to the Internet fad, E-commerce, e-banking, online casinos are victimized. The vulnerability in the webpage of Gmail is found out during research study. The studies of vulnerability lead to cyber disasters using Phishing attacks through which the passwords were retrieved and accessed of various people. Users should be more aware as well as updated in terms of technology which can diminish these cyber disasters.
Key-Words / Index Term :
Phishing Attack, DDoS
References :
[1] Norton Report (2013). Available at
[2] Karnika Seth (8th May 2010). IT Act 2000 vs 2008- Implementation, Challenges, and the Role of Adjudicating Officers. Available at
[3] 2013- The Impact of Cyber Crime. Available at
[4] EERI Special Earthquake Report — April 2005 global cyber war and crime: A conceptual framework * Bryan School of Business and Economics, The University of North Carolina at Greensboro, Bryan Building, Room: 368, P.O. Box 26165, Greensboro, NC 27402-6165, USA ,Received 14 December 2004; accepted 14 September 2005.
[5] Chris Welch(3rd October, 2013). Available at
[6] Kounteya Sinha (28th Feb, 2014). Available at
[7] Steven Musil (February 11, 2014). Available at < http://news.cnet.com/8301-1009_3-57618762-83/record-breaking-ddos-attack-in-europe-hits-400gbps/> (Retrieved 23rd March,2014)
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.