z-logo
open-access-imgOpen Access
A Systematic Review of Network Security Breaches and Solutions
Author(s) -
Ravi Tomar,
Yogesh C. Awasthi
Publication year - 2020
Publication title -
international journal of innovative technology and exploring engineering
Language(s) - English
Resource type - Journals
ISSN - 2278-3075
DOI - 10.35940/ijitee.k7812.0991120
Subject(s) - computer security , spoofing attack , computer science , denial of service attack , cloud computing , asset (computer security) , personally identifiable information , network security , information security , cloud computing security , order (exchange) , internet privacy , business , the internet , world wide web , operating system , finance
Cyber Security is the protection of unauthorized access of the information. Different threat and issues are present in the network which stole unpredictable amount of data every year. For the information technology and computer systems, a cyber security rule is required to compel different group as well as businesses to secure their systems and information from cyber-attacks. In the healthcare sector huge amount of data can be theft every year which is dangerous for both government and personal view. The technical advancements have increased the risk’s potential in the network in Cloud and Cyber. Security & privacy cracks are the vital issues which need to mitigate to maintain the dignity of the network. This paper conducted a review to secure the network from network security issues. There are various attacks which are vulnerable to the network like DoS, DDoS and Spoofing. These attacks have been described to identify the attacker’s capability. In order to facilitate this, networks such as cloud, ad-hoc, cyber has been described to determine the security, a paradigm. A literature from past studies has been conducted to identify the threats and their behavior. Different types of attacks and their behavior is also studied, and a tabular structure is also presented for better understanding.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here