logo

Literature Survey: Network Security and Data Privacy Protection

   

Added on  2023-06-16

14 Pages3790 Words402 Views
Running head: NETWORK SECURITY AND DATA PRIVACY PROTECTION
Literature Survey: Network Security and Data Privacy Protection
Name of the Student:
Name of the University:
Literature Survey: Network Security and Data Privacy Protection_1
1
NETWORK SECURITY AND DATA PRIVACY PROTECTION
Table of Contents
1.0 Introduction................................................................................................................................2
2.0 Network security........................................................................................................................2
3.0 Data privacy protection..............................................................................................................3
4.0 Benefits of Network Security and Data Privacy Protection......................................................5
5.0 Challenges of Network Security and Data Privacy Protection..................................................7
6.0 Summary and conclusion...........................................................................................................8
7.0 Research problem......................................................................................................................9
References......................................................................................................................................11
Literature Survey: Network Security and Data Privacy Protection_2
2
NETWORK SECURITY AND DATA PRIVACY PROTECTION
1.0 Introduction
The purpose of this literature survey is to analyze the published literature on network
security and data privacy protection. The scope of literature review is to analyze the benefits of
network security in relation to protection of data privacy. The selected topic is the aspect of the
information technology which deals with ability of the organization to resolve what and which
data are shared with the third parties (Lu et al. 2014). The significance of literature review is
address of the challenges associated with the security off network and privacy of data. The
challenge of the data privacy is utilization of data while protecting of the privacy of the
individuals in addition to identifiable information. The main aim is to provide of solutions to the
identified problems in the field of information technology.
2.0 Network security
According to Duan and Wang (2015), network security is critical for the financial health
of each and every organization. Over the past years, internet enabled businesses are improving
efficiency along with growth in their revenue. Network technology is considered as key
technology into different types of applications. The e-business applications allow the business
organization to lower the operating cost, streamline the business processes and increase into
customer satisfaction. As network is enabled to more users, therefore it becomes more vulnerable
to the security threats. Those threats affect the transactions of e-business. Zhang et al. (2015)
stated that network security is required in an organization to protect of the company’s assets,
gain of competitive advantage and comply with the regulatory requirements. The computer
network technology is developing rapidly, therefore development of the internet technology
Literature Survey: Network Security and Data Privacy Protection_3
3
NETWORK SECURITY AND DATA PRIVACY PROTECTION
becomes quick and people are aware of importance of network security. Suo et al. (2013) argued
that it is the main issue in computing as it is increasing on regular basis. Security over the
network is started with authorization such as username as well as password. It consists of various
policies which are adopted by network administrator for preventing and monitoring of
unauthorized access to the system. In order to prevent of unauthorized access to the system,
Antivirus software is used to detect of malware from the network or system (Kang et al. 2015).
Anomaly is used to monitor the network and logged for audit functions into the system.
Throughout secure of the network is important as secure of computer and encrypted
messages. In order to secure the network, confidentiality and integrity are required to be
considered. Rhodes-Ousley (2013) cited that in confidentiality, the unauthorized person cannot
examine the data and in integrity, it is guaranteed that the data which is send by the sender are
not changed when it is received by the receiver. At the time of transferring of one node to
another, communication channel is not vulnerable to the attack. The hacker targets the
communication channel, gets the data and then decrypts it. Secure of the network is significantly
important as secure of the computers along with encrypts of the messages (Sicari et al. 2015). It
becomes important due to inter connection of the computers and network.
3.0 Data privacy protection
Winkler and Rinner (2014) determined that data privacy protection is about secure of
data against the unauthorized access. It is an ethical issue within the organization which is
required to be solved on time. Data protection strategies ensure that the data are restored properly
after it has being lost and corrupted. Protection of data from compromise as well as ensure of the
data privacy are the key components into the data protection. Cao et al. (2014) illustrated that
Literature Survey: Network Security and Data Privacy Protection_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Study on IoT Security and Privacy Preservation
|18
|3563
|84

Information Technology for Managers
|23
|6894
|51

(PDF) Wireless Network Security
|14
|3699
|37

Status of Network Security - What Works and Does not Work and Why | Report
|17
|4184
|44

COIT20249 Rahman and Choo- Annotated Bibliography
|5
|1048
|35

Challenges of Internet of Things in Health care sector
|8
|1491
|206