logo

Network Security Attacks: Empirical and Business Research

10 Pages2787 Words394 Views
   

Added on  2023-06-07

About This Document

This research paper focuses on network security attacks in wireless sensor networks and cloud systems. The paper analyzes the security issues and attacks in the network both quantitatively and qualitatively. Theoretical constructs and variables used in the articles are discussed along with the leadership demonstrated in some of the business articles. The paper also discusses the integration of new technologies to address security issues.

Network Security Attacks: Empirical and Business Research

   Added on 2023-06-07

ShareRelated Documents
Running head: PERFORM TECHNOLOGY RESEARCH
Network Security Attacks
Name of the Student:
Name of the University:
Network Security Attacks: Empirical and Business Research_1
1PERFORM TECHNOLOGY RESEARCH
1. Identification of type of research
From the academic viewpoint, the research is based on computer research where the
selected research topic is network security attacks. This is an empirical research, is a way to
gain knowledge by means of direct as well as indirect observation. This research is analyzed
both quantitatively as well as qualitatively. Wireless sensor network is a growing advanced
technology and there are possibility of security attacks as the network is prone to malicious
users. Security is fundamental requirements of the networks, therefore this paper is focused
on the security attacks in the network (Anwar et al., 2014). Security attacks are major concern
for the network due to its physical accessibility of the sensor and using of minimal capacity
into the network. Reddy and Sreenivasulu (2016) stated that availability into the network
ensures that the network services are feasible even into denial of the service attacks.
Authenticity is required for the network as adversary is easier to inject the messages.
Authenticity of data is required to identify the communicational nodes.
From the business viewpoint, it is a business research which is involved to acquire of
information as well as knowledge for the professional as well as commercial purposes. It
determines opportunities for the business organization. The network is developed due to new
level of IT environments, networking, administration of the information, security as well as
social variables. Hajli and Lin (2016) argued that capabilities of the software defined
networking is easier to detect as well as react to the security attacks. The research is basically
network based where identification of the security issues are analyzed. The existing system
has lack of accuracy as well as faster while data aggregation that decreases performance of
errors. In selected articles, the researcher is focused to analyse reasons why security attacks
are becoming prevalent into the cloud computing and wireless sensor network (Chang, Shen,
& Liu ̧2016). This paper is based on exploring current technologies which are related to
Network Security Attacks: Empirical and Business Research_2
2PERFORM TECHNOLOGY RESEARCH
security attacks and future research are beneficial to the issues. Into the smart cities, security
of the network is a key issue. Wireless security network components are not included of
mutable attributes, therefore the security components are not defend the ongoing attacks.
2. Identification of three areas of interest from the theoretical
standpoint
Based on the empirical research on selected research topic, the three areas of interest from
the theoretical standpoint are:
Software defined networking
Cloud system and network
Network security or cyber security
Software defined networking (SDN): It is such an architecture which aims to make
network agile in addition to flexible. The goal of this network is to make improvement over
network control by enabling the enterprises to respond to the business requirement changes.
The network devices are made to take of traffic decisions based on configurations of the
routing tables (Liu et al., 2016).
Cloud system and network: It is such a computer network which is provided of
interconnectivity among the cloud based applications as well as network. It is a term which is
used to describe access to the networking resources from the centralized third party providers.
Therefore, the cloud network is such a network which is existed in the infrastructure of cloud
based server (Rezvani et al., 2015).
Network security: It is a body of technologies which is used to protect the network,
computers and data from the network attacks or any type of unauthorized access. Network
security is enabled to ensure that security of the assets is included of network traffic such as
Network Security Attacks: Empirical and Business Research_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(PDF) Research Methods in Computing
|26
|6517
|161

Wireless Network Security and Preventive Techniques
|12
|3476
|20

Efficient IDS(intrusion detection system) in WSN (Wireless sensor network) : Report
|5
|1680
|214

Security Issues in Cloud Computing- Document
|7
|1373
|77

Internet of things - Assignment
|13
|4549
|42

Wireless Single Board Computing Devices
|9
|2964
|180