Real Time Network Security Intrusions and Risk Management: A Survey
Main Article Content
Abstract
Due to the massive use of the Internet by people, institutions and organizations for many reasons, so they need to make sure that all their information is safe and free from tampering with their information, theft, disclosure, and misuse of it in a way that could harm them. In general, no one can be able to find an Internet, organizations, companies, or even users' personal devices that are not threatened by security breaches, intrusions, and any kind of attacks. This paper surveys recent researches related to network security intrusions and risk management. In addition, this work aims to clarify how to detect illegal intrusions. Furthermore, evaluate and control risks and reduce them to acceptable levels. Also discussing strategies for managing them
Downloads
Metrics
Article Details
Licensing
TURCOMAT publishes articles under the Creative Commons Attribution 4.0 International License (CC BY 4.0). This licensing allows for any use of the work, provided the original author(s) and source are credited, thereby facilitating the free exchange and use of research for the advancement of knowledge.
Detailed Licensing Terms
Attribution (BY): Users must give appropriate credit, provide a link to the license, and indicate if changes were made. Users may do so in any reasonable manner, but not in any way that suggests the licensor endorses them or their use.
No Additional Restrictions: Users may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.