Understanding and Protecting Yourself against Threats in the Internet
- Ajith Sundaram
Abstract
Reporting the incidents related to Computer Security has now become one of the most important component of the Information Technology programs with the increase in the attacks related to cyber security. The reason being the introduction of new and new security related incidents every day. It is giving light to the necessity of a quick and efficient incident response capability which could detect incidents, minimise the loss due to the destruction and mitigate the weaknesses that was exploited. This publication is a parameter for incident handling, especially for analysing event-related data and defining the appropriate response to each incident.
- Full Text: PDF
- DOI:10.5539/ass.v13n12p201
This work is licensed under a Creative Commons Attribution 4.0 License.
Journal Metrics
Index
- Academic Journals Database
- BASE (Bielefeld Academic Search Engine)
- Berkeley Library
- CNKI Scholar
- COPAC
- EBSCOhost
- EconBiz
- Elektronische Zeitschriftenbibliothek (EZB)
- Excellence in Research for Australia (ERA)
- Genamics JournalSeek
- GETIT@YALE (Yale University Library)
- Harvard Library
- IBZ Online
- IDEAS
- Infotrieve
- JournalTOCs
- LOCKSS
- MIAR
- Mir@bel
- NewJour
- OAJI
- Open J-Gate
- PKP Open Archives Harvester
- Publons
- Questia Online Library
- RePEc
- SafetyLit
- SHERPA/RoMEO
- Standard Periodical Directory
- Stanford Libraries
- Technische Informationsbibliothek (TIB)
- The Keepers Registry
- Universe Digital Library
- VOCEDplus
- WorldCat
Contact
- Jenny ZhangEditorial Assistant
- ass@ccsenet.org