\u2022Network Security Problems
\u2022Key process Techniques
\u2022Advanced cryptographic technique
\u2022Applications of cryptography
\u2022Application of network security
\u201cSECURITY\u201d in this
contemporary scenarios has become a
more sensible issue either it may be in
the \u201cREAL WORLD\u201d or in the \u201cCYBER
WORLD\u201d. In the real world as opposed
to the cyber world an attack is often
preceded by information gathering.
Movie gangsters \u201ccase the joint\u201d;
soldiers \u201cscout the area\u201d. This is also
true in the cyber world. Here the \u201cbad
guys\u201d are referred to as intruders,
eavesdroppers, hackers, hijackers, etc.
The intruders would first have a
panoramic view of the victims network
and then start digging the holes.
This action might not be possible to undo. Are you sure you want to continue?