ANALYSIS OF EXISTING THREATS AND VULNERABILITIES IN COMPUTER NETWORKS
DOI:
https://doi.org/10.17605/OSF.IO/XVGRHKeywords:
Tarmoq, protokollar, tahdid, zaiflik, tarmoq xavfsizligi, himoyaAbstract
This article will focus on possible threats and vulnerabilities in computer networks. When comparing the internal and external vulnerabilities of the network, the shortcomings, vulnerabilities and threats contained in the protocols are caused precisely by which perimeter attacks are made. At the end of the article, suggestions and recommendations were made against these vulnerabilities.
Downloads
Published
2022-10-04
Issue
Section
Articles
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
ANALYSIS OF EXISTING THREATS AND VULNERABILITIES IN COMPUTER NETWORKS. (2022). Academicia Globe: Inderscience Research , 3(10), 53-56. https://doi.org/10.17605/OSF.IO/XVGRH







