Review on Computer Network Security

Authors

  • SOUMEN CHAKRABORTY

Keywords:

PC; Security; Infection; Organization ; Huge information; Network safety.

Abstract

Computer network security is crucial in protecting computer networks and their associated devices, software, and data from unauthorized access, attacks, and damage. The rapid advancement of technology has greatly improved our productivity, but it has also brought significant security risks, especially in the era of big data. These issues require everyone's attention. This study focuses on recent computer network security issues and proposes preventive measures. It is recommended to hire a professional team to conduct regular security audits, promote security awareness, change passwords regularly, download and install network firewall software, timely disclose security vulnerabilities, and for the government to introduce online privacy regulations.

References

van der Voort HG, Klievink AJ, Arnaboldi M, Meijer AJ. Rationality and politics of algorithms. Will the promise of big data survive the dynamics of public decision making? Gov Inf Q. 2019 Jan; 36(1): 27–38. [Internet] Available from: https://www.sciencedirect.com/science/article/ pii/S0740624X17304951 [cited 2023 Apr 1]

Manzoor Hashmani, Muslim Jameel Syed, Aidarus M, Raza K. An Ensemble Approach to Big Data Security (Cyber Security). Int J Adv Comput Sci Appl (IJACSA). 2018; 9(9): 75–77. ResearchGate. SAI Organization; 2018. [Internet] Available from: https://www.researchgate.net/publication/327985602_An_Ensemble_Approach_to_Big_Data_Sec urity_Cyber_Security [cited 2023 Apr 1]

Varela-Vaca ÁJ, Rosado DG, Sánchez LE, Gómez-López MT, Gasca RM, Fernández-Medina E. CARMEN: A framework for the verification and diagnosis of the specification of security requirements in cyber-physical systems. Comput Ind. 2021 Nov; 132: 103524. [Internet] Available from: https://www.sciencedirect.com/science/article/pii/S0166361521001317 [cited 2023 Apr 1]

Vinod P, Laxmi V, Gaur MS. Survey on Malware Detection Methods. Proceedings of the 3rd Hackers’ Workshop on Computer and Internet Security, Kanpur. 2009 Mar 17–19; 74–79. References - Scientific Research Publishing [Internet]. Scirp.org. 2018 [cited 2023 Apr 1]. Available from: https://www.scirp.org/%28S%28351jmbntvnsjt1aadkposzje%29%29/reference/ referencespapers.aspx?referenceid=2372436

Vineeth Krishna C, Narayana Swamy C, Viji Amutha Mary A, Selvan MP. Identification of Phishing Urls Using Machine Learning. J Phys: Conf Ser. 2021 Mar 1; 1770(1): 012009. [Internet] Available from: https://iopscience.iop.org/article/10.1088/1742- 6596/1770/1/012009/meta [cited 2023 Apr 1]

Al-Shehari T, Alsowail RA. An Insider Data Leakage Detection Using One-Hot Encoding, Synthetic Minority Oversampling and Machine Learning Techniques. Entropy. 2021 Sep 27; 23(10): 1258. [Internet] Available from: https://www.ncbi.nlm.nih.gov/pmc/articles/ PMC8535057/ [cited 2023 Apr 1]

Yeshwanth Rao Bhandayker. Security Mechanisms for Providing Security to the Network. Int J Inf Technol Manag. 2017 Feb; 12(1): 193–198. Ignited Minds Journals [Internet]. Ignited.in. 2017 [cited 2023 Apr 1]. Available from: http://ignited.in/a/58540

Mounica Doosetty, Keerthi Kodakandla, Ashok R, Shoban Babu Sriramoju. Extensive Secure Cloud Storage System Supporting Privacy-Preserving Public Auditing. Int J Inf Technol Manag. 2014 Feb; 6(1): 1–5. Ignited Minds Journals. Ignited.in. [cited 2023 Apr 1]. Available from: http://ignited.in/p/2572

Fang H. Managing data lakes in big data era: What's a data lake and why has it became popular in data management ecosystem. In 2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). 2015 Jun 8; 820–824.

Bishop M. What is computer security? IEEE Security & Privacy. 2003 Jan; 1(1): 67–9

Published

2023-04-24

How to Cite

SOUMEN CHAKRABORTY. (2023). Review on Computer Network Security. NOLEGEIN- Journal of Information Technology &Amp; Management, 5(2), 1–4. Retrieved from https://www.mbajournals.in/index.php/JoITM/article/view/1005