International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-9,Issue-5  ( May, 2021 )
Past issues
  1. Volume-9,Issue-4  ( Apr, 2021 )
  2. Volume-9,Issue-3  ( Mar, 2021 )
  3. Volume-9,Issue-2  ( Feb, 2021 )
  4. Volume-9,Issue-1  ( Jan, 2021 )
  5. Volume-8,Issue-12  ( Dec, 2020 )
  6. Volume-8,Issue-11  ( Nov, 2020 )
  7. Volume-8,Issue-10  ( Oct, 2020 )
  8. Volume-8,Issue-9  ( Sep, 2020 )
  9. Volume-8,Issue-8  ( Aug, 2020 )
  10. Volume-8,Issue-7  ( Jul, 2020 )

Statistics report
Sep. 2021
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 100
Paper Published : 1307
No. of Authors : 3297
  Journal Paper


Paper Title :
The Most Common Vulnerabilities And Open Source Prevention Software

Author :Mehmet Mehdi Karakoc, Mustafa Ulas, Asaf Varol

Article Citation :Mehmet Mehdi Karakoc ,Mustafa Ulas ,Asaf Varol , (2015 ) " The Most Common Vulnerabilities And Open Source Prevention Software " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 19-26, Volume-3, Issue-5

Abstract : To store data and information on digital media and be accessible via the internet, makes the life easy. Lots of user save or share personal information on digital platforms which are defined as local or public source. Banks, government agencies, commercial organizations also store and operate institutional customers’ information on digital systems. An account information of a customer, a secret project that a company working on, an official secret which saved on a digital platform also attract the attention of attacker. Therefore the concept of information security has been put forward. In the first part of this study; information, information security, privacy, availability, data integrity, the importance of information security; data theft and the reasons of it have been described. Other parts, describe the most common types of malwares, web application security risks and the open source intrusion detection and prevention software that can be used against risks and malwares. Keywords- Component; Information Security, Malwares, Vulnerabilities, Intrusion Detection Systems, Open Source

Type : Research paper

Published : Volume-3, Issue-5


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2043   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 91
| Published on 2015-05-07
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY