Conclusion
Network security has brought to our society, a quick development and attractive area of interesting, when we take into consideration the fact of security builders providing confidentiality, integrity, authentication, it is meaning different and distant focus into the features of the Network security policy. WE must relate the fact by using efficient technology.
References
Traitov, 2022. Cybersecurity and secure network concept. [image] Available at: <https://www.gettyimages.co.uk/detail/photo/cybersecurity-and-secure-nerwork-concept-data-royalty-free-image/1197780051> [Accessed 5 May 2022].
MARIN, G. M,
IEEE Computer Society's Technical Community on Security and Privacy
In-text: (Marin, 2022)
Your Bibliography: Marin, G., 2022. IEEE Computer Society's Technical Community on Security and Privacy. [online] Ieee-security.org. Available at: <https://www.ieee-security.org/> [Accessed 13 May 2022].
(Heberlein,, L., 2022. A network security monitor. [online] Ieeexplore.ieee.org. Available at: <https://ieeexplore.ieee.org/abstract/document/63859/> [Accessed 13 May 2022].
Kizza, J., 2022. [online] Amazon.com. Available at: <https://www.amazon.com/Computer-Network-Security-Communications-Networks/dp/1447145429> [Accessed 13 May 2022].
Mohammed, K., 2022. [online] Available at: <https://www.researchgate.net/publication/329353305_Identity_and_Access_Management_System_a_Web-Based_Approach_for_an_Enterprise> [Accessed 13 May 2022].
pirimeter21, 2022. Edge Security: How to Secure the Edge of the Network. [online] eSecurityPlanet. Available at: <https://www.esecurityplanet.com/networks/edge-security-how-to-secure-the-edge-of-the-network/> [Accessed 13 May 2022].
Comments
Post a Comment