Network Security using NAC on Threats Plagiarism Sabotage Data breaches

Supriya Menon, Spurthi. K

Abstract


The threats for information security are increasing at an alarming rate. This is mainly because of the availability of hacking tools on the Internet, USB devices, wireless connectivity, etc. This paper presents the brief understanding about risk management, network threats, firewalls, software licensing types and more special purpose secure networking devices. It suggests mitigation techniques in network security to meet the organization’s standard. Our studies show that the proposed enhancements provide better data confidentiality with some degree of computing cost as the trade-off.
Keywords -Network Access Control (NAC); Information Security Strategy; Insider’s Threats; Plagiarism; Sabotage; Data breaches

Full Text:

PDF




Copyright (c) 2016 Supriya Menon, Spurthi. K

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org