ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A DESCRIPTIVE STUDY ON NETWORK SECURITY ISSUES AND CHALLENGES OF 21ST ERA

Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.9, No. 5)

Publication Date:

Authors : ;

Page : 190-198

Keywords : Security Attacks; Security Measures; Social network service; Security and privacy; Security threats;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In today's world, social networks are very common. Various types of social networks are used by millions of users and they enable people to communicate with friends and relatives while still allowing them to exchange private details. However, problems with preserving a user's information's privacy and protection may arise, particularly where the user's posted material is multimedia, such as images, videos, and audios. Uploaded multimedia material contains knowledge that can be spread virally and nearly instantly inside and outside of a social networking platform. Any business must also have a stable network. Every day, new security threats emerge, making high-speed wired and wireless networks, as well as internet links, insecure and inefficient. Security measures strategies nowadays are more oriented on satisfying the cutting-edge needs of today's rapidly growing industries. In areas like privacy, where secure and authenticated resource access is one of the most critical facets of information security, the need is often triggered. The author of this paper has summarised the necessary steps and criteria for establishing a reliable network in the context of large industry/organizational needs. Wi-Fi networks are commonly used to link different services to cellular networks and to wirelessly connect numerous computers. Various requirements are needed to cope with Wi-Fi attacks and network hacking attempts. The aim of this paper is to create a fully secure and privacy network infrastructure in an organisation by looking at main security techniques for different network scenarios. The author used a case study to show the absolute minimum of security protocols that must be applied in any business. Furthermore, we concentrate on different risks that occur as a result of the distribution of multimedia material on a social networking platform separately. We will go through the most up-to-date security options for protecting social network service consumers against these attacks. Then, in order to accomplish the aim of a trustworthy and stable social network ecosystem, we propose future directions and explore several simple solution strategies.

Last modified: 2022-03-09 21:08:19