Retrieved de https://studentshare.org/information-technology/1391033-analyzing-and-contrasting-data-mining-based
https://studentshare.org/information-technology/1391033-analyzing-and-contrasting-data-mining-based.
In this age of the Information Revolution, there are obvious advantages that can be reaped from the vast and ever growing Internet Community of the web: 24/7 connectivity; robust e-commerce that simplified business transactions and operations; erasure of geographical separation and distance; and access to a multitude of modern means of communications. Yet, as the benefits derived from being part of the Internet community are numerous to mention, one resounding concern that pervades this virtual world is security.
Most, if not all, entities that are part of the Internet world are on their toes, keeping an eye on their own virtual space on the Internet. Security is an important word in the Internet today. There are many people actively involved in developing attack software and are ready to attack anyone and any site that has a vulnerability in its network security setup. As defenses are developed, the attack software is modified to adapt to those defenses and launch even more deadly attacks. These attacks not only stop people from using their computer systems but some are also designed to damage the target computers or the data that they store.
Since many e-commerce companies and enterprises depend on the Internet for their survival, it is not a surprise that there is an interest in finding different way to protect one’s network.. s age of the Information Revolution, there are obvious advantages that can be reaped from the vast and ever growing Internet Community of the web: 24/7 connectivity; robust e-commerce that simplified business transactions and operations; erasure of geographical separation and distance; and access to a multitude of modern means of communications.
Yet, as the benefits derived from being part of the Internet community are numerous to mention, one resounding concern that pervades this virtual world is security. Most, if not all, entities that are part of the Internet world are on their toes, keeping an eye on their own virtual space on the Internet. Security is an important word in the Internet today. There are many people actively involved in developing attack software and are ready to attack anyone and any site that has a vulnerability in its network security setup.
As defenses are developed, the attack software is modified to adapt to those defenses and launch even more deadly attacks. These attacks not only stop people from using their computer systems but some are also designed to damage the target computers or the data that they store. Since many e-commerce companies and enterprises depend on the Internet for their survival, it is not a surprise that there is an interest in finding different way to protect one’s network. Over the past couple of decades, techniques to secure network through latest technology have gained an importance and have proven to be a necessity to any entity maintaining a network.
The need for security has spawned in the design of firewalls, cryptography, authentication and many different intrusion detection systems. Among these security tools, network intrusion detection systems hold the potential to become a tool against computer crime. An
...Download file to see next pages Read More