Professional Documents
Culture Documents
Unit - 5 Nextgen
Unit - 5 Nextgen
Chapter - 5
Speed of attacks
Sophistication of attacks
Faster detection of weaknesses
Distributed attacks
Difficulties of patching
Latest security Trends
Spyware
Keyloggers
Rootkits
Mobile malware
Combined attack mechanisms
Malware Trends - Spyware
Useful purposes:
Help determine sources of errors on system
Measure employee productivity on certain clerical
tasks
Malware Trends - Rootkits
Definition:
local rules
The changes affect a neuron’s immediate environment
Emergency Operations
• Ad hoc wireless networks are useful in emergency operations such as search
and rescue, and crowd control.
17
Wireless Mesh Networks
Why VoIP
IP telephony is economic; High costs for traditional telephone
switching equipments.
21
RESEARCH AREAS
Every 1 of us must
take steps to protect
our Earth's climate.
By
Prof. Dr. Sebastian Nixon