Eavesdropping attack problem threat in cyber network security and wireless sensor network

  • strict warning: Non-static method view::load() should not be called statically in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/views.module on line 906.
  • strict warning: Declaration of views_handler_argument::init() should be compatible with views_handler::init(&$view, $options) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_argument.inc on line 744.
  • strict warning: Declaration of views_handler_filter::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_filter.inc on line 607.
  • strict warning: Declaration of views_handler_filter::options_submit() should be compatible with views_handler::options_submit($form, &$form_state) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_filter.inc on line 607.
  • strict warning: Declaration of views_handler_filter_boolean_operator::value_validate() should be compatible with views_handler_filter::value_validate($form, &$form_state) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_filter_boolean_operator.inc on line 159.
  • strict warning: Non-static method view::load() should not be called statically in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/views.module on line 906.
  • strict warning: Non-static method view::load() should not be called statically in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/views.module on line 906.
Author: 
Umesh Sehgal, A.P. and Kamaljeet Singh, A.P
Abstract: 

Computer Security, also known as cyber security or IT security is the protection of computer systems from the theft or damage to the hardware. The field is of growing importance due to the increasing reliance on systems and the internet in most societies. Eavesdropping is the act of surreptitiously listening to a private conversation, typically between hosts on a network. For programs such as carnivore and narusinsight have been used in FBI and NSA to eavesdrop on the systems. In this research critical in almost any industry which uses computers, but 100 percent accurate and dependable to protect our data. There are many different ways of hacking into computers.

Download PDF: 

CHIEF EDITOR

  

           Prof. Dr. Bilal BİLGİN

Call for Papers - 2017

    submit your paper now

   Vol. 07, Issue 03, March 2017

CURRENT ISSUE

 

Article Tracking

IMPACT FACTOR 2016

          4.753

Get your Certificate

Copyright © 2016 International Journal Development Research. All Rights Reserved.