« More blog articles
Network Security

Preventing Network Security Threats

Posted on: May 1, 2020

In the digital world we live in, network security has become essential to every organization in order to prevent against threats such as viruses and malware. The networks connecting interacting devices need to be protected so colleagues and clients can operate safely. You can always stay updated on the latest in Network Security whether you are work in IT, cybersecurity, security software engineering or security consulting by viewing the latest titles by Taylor and Francis here.

Access chapters from some of our top Network Security titles with our Network Security FreeBook. It provides an understanding on several relevant topics such as authentication, mobile operating systems, and cyber resilience.

Network Security

Download the FreeBook here.

The Role of Game DesignSecurity Overview 

From Introduction to Computer and Network Security By Richard R. Brooks. This chapter provides a brief overview of security and privacy. At the end of this chapter, the reader should understand the different levels of security a system can have, common vulnerabilities and exploits, and how attackers can combine vulnerabilities and exploit them to accomplish a larger goal.

The Basics of ArtAssessing Current Network Concerns

From Managing A Network Vulnerability Assessment By Thomas R. Peltier, Justin Peltier, John A. Blackley. This chapter examines current trends in network incidents. As an individual charged with conducting a network vulnerability assessment (NVA) within your own enterprise, you will quickly discover that there are more possible problems or risks than you will have time to assess. To improve your chances of being successful, it will be necessary to identify which risks concern your enterprise most and then concentrate on them.

Game Animation FundamentalsMobile Platform Security

 From Network and Data Security for Non-Engineers by Frank M. Groom, Kevin Groom, Stephan S. Jones. People are increasingly relying on mobile devices to perform the majority of their daily tasks, leading many attackers to focus their efforts on mobile operating systems within the top-tier markets. While there are dierent operating systems, the attack vectors to which they are vulnerable are quite similar. Many of the vulnerabilities associated with mobile devices were previously associated with non-mobile desktops, laptops, and tablets. e following summarizes three of these mobile platforms.

Game Engine ArchitectureAndroid Applications Privacy Risk Assessment

From Intrusion Detection and Prevention for Mobile Ecosystems by Georgios Kambourakis, Asaf Shabtai, Constantinos Kolias, Dimitrios Damopoulos. In this chapter, we study Android apps' features that can be used to assess their intrusiveness to end-users' private sphere, so end-users can be informed about possible privacy exposure in the direction of a mobile app's risk assessment methodology. To do so, we introduce a practical and an easily employable approach that does not require access to the app's original source code. We evaluate our approach using both goodware and malware.

3D ConceptsSignificance of Authentication — Future Internet Architecture

From Flexible Network Architectures Security Principles and Issues by Bhawana Rudra. This chapter aims to discuss an authentication mechanism for Future Internet architectures, a case study of an architecture is considered to compare the performance analysis with TCP/IP in the distributed environment. Authentication is a process of determining a user who they claim to be whereas biometric authentication is a process of recognizing the person using a digitized biological piece of the human. Threats involve attacks against the authentication protocols itself, and the attacks that reveal tokens or any sensitive information.

Sketching BasicsStrategies for Improving Cyber Resilience of Data-Intensive Business Information Systems

From Handbook of e-Business Security by João Manuel R.S. Tavares, Brojo Kishore Mishra, Raghvendra Kumar, Noor Zaman, Manju Khari. The chapter explores the various components of cyber resilience. Based on the literature, the components have been categorized into the following categories: sense, resist, and recover. The chapter presents various components that help organizations to develop cyber resilience. Ada S. Peter was able to bring in the cyber resilience angle to national security preparedness.

The Role of Game Design