COMPARISON OF DIFFERENT SECURITY TOOLS TO DETECT RISKS IN NETWORKS
DOI:
https://doi.org/10.61306/ijecom.v1i1.3Abstract
Today, maintaining network security is a significant challenge. Data that has crossed a network is not regarded as secure. There are many risks, including snipping, phishing, spyware, hacking, and spoofing. Various network threats were covered in this article. There are numerous open-source technologies available to defend against these attacks. This study has examined tools like Acunetix and Intrusion Prevention System (IPS).
Downloads
Published
How to Cite
Issue
Section
License
COPYRIGHT
Copyright of any article in the International Journal of Computer Sciences and Mathematics Engineering is held by the author under a Creative Commons Attribution-ShareAlike 4.0 International License.
- The author acknowledges that the International Journal Of Computer Sciences and Mathematics Engineering has the right to be the first to publish under a Creative Commons Attribution-ShareAlike 4.0 International License – CC BY-SA.
- Authors can submit articles separately, arrange for non-exclusive distribution of manuscripts that have been published in this journal into other versions (eg sent to the author's institutional respository, publication into books, etc.), by acknowledging that the manuscript has been published for the first time in the International Journal of Computer Sciences and Mathematics Engineering.
LICENCE
The International Journal Of Computer Sciences and Mathematics Engineering is published under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License. This license permits anyone to copy and redistribute this material in any form or format, compose, modify, and make derivatives of this material for any purpose, including commercial purposes, as long as they give credit to the Author for the original work.