Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions]
- Publication Type:
- Journal Article
- IEEE Consumer Electronics Magazine, 2017, 6 (4), pp. 24 - 27
- Issue Date:
Files in This Item:
|Paper_consumer_Electronics.pdf||Published Version||509.36 kB|
|Puthal_IEEE-CEM_2017-Oct_Security-Perimeters (1).docx||Accepted Manuscript Version||563.66 kB|
Microsoft Word XML
Copyright Clearance Process
- Recently Added
- In Progress
- Open Access
This item is open access.
© 2012 IEEE. Due to the wide variety of devices used in computer network systems, cybersecurity plays a major role in securing and improving the performance of the network or system. Although cybersecurity has received a large amount of global interest in recent years, it remains an open research space. Current security solutions in network-based cyberspace provide an open door to attackers by communicating first before authentication, thereby leaving a black hole for an attacker to enter the system before authentication. This article provides an overview of cyberthreats, traditional security solutions, and the advanced security model to overcome current security drawbacks.
Please use this identifier to cite or link to this item: