A DESCRIPTIVE STUDY ON NETWORK SECURITY ISSUES AND CHALLENGES OF 21ST ERA
Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.9, No. 5)Publication Date: 2018-12-29
Authors : K. S. Arun R. Ragunath;
Page : 190-198
Keywords : Security Attacks; Security Measures; Social network service; Security and privacy; Security threats;
Abstract
In today's world, social networks are very common. Various types of social networks are used by millions of users and they enable people to communicate with friends and relatives while still allowing them to exchange private details. However, problems with preserving a user's information's privacy and protection may arise, particularly where the user's posted material is multimedia, such as images, videos, and audios. Uploaded multimedia material contains knowledge that can be spread virally and nearly instantly inside and outside of a social networking platform. Any business must also have a stable network. Every day, new security threats emerge, making high-speed wired and wireless networks, as well as internet links, insecure and inefficient. Security measures strategies nowadays are more oriented on satisfying the cutting-edge needs of today's rapidly growing industries. In areas like privacy, where secure and authenticated resource access is one of the most critical facets of information security, the need is often triggered. The author of this paper has summarised the necessary steps and criteria for establishing a reliable network in the context of large industry/organizational needs. Wi-Fi networks are commonly used to link different services to cellular networks and to wirelessly connect numerous computers. Various requirements are needed to cope with Wi-Fi attacks and network hacking attempts. The aim of this paper is to create a fully secure and privacy network infrastructure in an organisation by looking at main security techniques for different network scenarios. The author used a case study to show the absolute minimum of security protocols that must be applied in any business. Furthermore, we concentrate on different risks that occur as a result of the distribution of multimedia material on a social networking platform separately. We will go through the most up-to-date security options for protecting social network service consumers against these attacks. Then, in order to accomplish the aim of a trustworthy and stable social network ecosystem, we propose future directions and explore several simple solution strategies.
Other Latest Articles
- SYSTEM AND HOME APPLIANCES CONTROL USING MEMS ACCELEROMETER
- ELUCIDATING THE POWER ELECTRONICS APPLICATION IN POWER SYSTEM
- DETERMINANTS DE LEFFICACITE TECHNIQUE DES PRODUCTEURS DES TOMATES AU KONGO CENTRAL EN RD. CONGO
- RATE ANALYSIS OF SOIL EROSION USING UNIVERSAL SOIL LOSS EQUATION (USLE) METHOD IN JENEBERANG WATERSHED
- Review Sentimental Analysis
Last modified: 2022-03-09 21:08:19