Building Security Perimeters to Protect Network Systems Against Cyberthreats

Publisher:
Institute of Electrical and Electronics Engineers
Publication Type:
Journal Article
Citation:
IEEE Consumer Electronics Magazine, 2017
Issue Date:
2017-09-22
Full metadata record
Files in This Item:
Filename Description Size
Paper_consumer_Electronics.pdfPublished Version509.36 kB
Adobe PDF
Puthal_IEEE-CEM_2017-Oct_Security-Perimeters (1).docxAccepted Manuscript Version563.66 kB
Microsoft Word XML
Due to the wide variety of devices used in computer network systems, cybersecurity plays a major role in securing and improving the performance of the network or system. Although cybersecurity has received a large amount of global interest in recent years, it remains an open research space. Current security solutions in network-based cyberspace provide an open door to attackers by communicating first before authentication, thereby leaving a black hole for an attacker to enter the system before authentication. This article provides an overview of cyberthreats, traditional security solutions, and the advanced security model to overcome current security drawbacks.
Please use this identifier to cite or link to this item: