TITLE

Managing Radical Network Changes

AUTHOR(S)
Fest, Glen
PUB. DATE
June 2006
SOURCE
Bank Technology News;Jun2006, Vol. 19 Issue 6, p37
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the computer network management in the U.S. According to the chief technical officers Glen Tindal of Intelliden Co., the changes of network in banking industry create a big impact to the network security management. In addition, the interest in network configuration has increased due to the vast increase of architecture application.
ACCESSION #
21445655

 

Related Articles

  • Solution of Cooperative Black Hole Attack Problem in Mobile Ad-Hoc Network. Gupta, Priyanka; Gauri, Kamna // International Journal of Advanced Research in Computer Science;Mar/Apr2012, Vol. 3 Issue 2, p180 

    Mobile Ad-hoc network is particularly vulnerable due to it's fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability. It can be established extremely flexibly without any fixed base station in battlefields, military applications,...

  • Securing Mobile Ad hoc Networks Using Enhanced Identity-Based Cryptography. Mehr, Kamal Adli; Niya, Javad Musevi // ETRI Journal;Apr2015, Vol. 37 Issue 2, p1 

    Recent developments in identity-based cryptography (IBC) bring about new solutions for the security of mobile ad hoc networks (MANETs). Although many proposals are suggested by research community, there is no complete solution and the proposed methods have some disadvantages. The interdependency...

  • A SCOPE FOR MANET ROUTING AND SECURITY THREATS. Lathies Bhasker T. // ICTACT Journal on Communication Technology;Dec2013, Vol. 4 Issue 4, p840 

    The mobile Ad-hoc networks (MANET) are wireless networks which utilize mobile nodes for communicating among them and in the external transmission range. The vulnerable nature of the network causes various security threats which upset its growth. In this survey, initially the existing security...

  • The Hitchhiker's Guide to IPv6. Brzozowski, John Jason // Communications Technology;Sep2009, Vol. 26 Issue 9, p18 

    The article focuses on the challenges of the adoption of Internet protocol (IP) version 6 (IPv6). It says that there are still gaps that could complicate network security and may prevent extending IPv6 beyond device management, despite the fundamentals of IPv6 security are well in place. It...

  • A Novel Multipoint Relay based Secure Routing in MANET. Saha, Himadri Nath; Bhattacharyya, Debika; Banerjee, P.K. // International Journal of Network Security & Its Applications;Nov2012, Vol. 4 Issue 6, p133 

    Security in routing is a challenging issue in mobile ad-hoc (MANET) network because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical...

  • Security Architecture for Cluster based Ad Hoc Networks. Vinayakray-Jani, Preetida; Sanyal, Sugata // International Journal of Advanced Networking & Applications;Jul/Aug2012, Vol. 4 Issue 1, p1523 

    Mobile Ad hoc Networks (MANETs) are subject to various kinds of attacks. Deploying security mechanisms is difficult due to inherent properties of ad hoc networks, such as the high dynamics of their topology, restricted bandwidth, and limited resources in end device. With such dynamicity in...

  • Performance Evaluation of AODV under Blackhole Attack. Bhatia, Tarunpreet; Verma, A. K. // International Journal of Computer Network & Information Security;Oct2013, Vol. 5 Issue 12, p35 

    Mobile Adhoc NETwork (MANET) consists of mobile nodes that can move freely and route packets without aid of centralized infrastructure. Dynamic changing topology, limited battery power and lack of centralized trusted authority make it vulnerable to several attacks and lot of research is being...

  • Performance Analysis of DSR and AODV in Manets: Using WLAN Parameters. Singh, Devendra; Dubey, Vandana; Sharma, Shipra // International Journal of Computer Applications;6/1/2012, Vol. 47, p1 

    In these days it is no longer optional to have security solutions predictable for every type of organizations and individuals. Security is one of the main issues in the MANET in particular with respect to size and complexity of the network. The aim of the paper is to discuss special security...

  • Secured and authenticated transmission of data using multipath routing in mobile AD-HOC networks. Anjaneyulu, G. S. G. N.; Madhu Viswanatham, V.; Venkateswarlu, B. // Advances in Applied Science Research;Aug2011, Vol. 2 Issue 4, p177 

    Non-infrastructure networks are most commonly called as Mobile Ad hoc networks (MANETs). Unavailability of infrastructure or complexity and expensiveness of setting up the infrastructure results in the need of MANETs. MANETs can also be used when a network is to be setup quickly. The most...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics