SIT340 Research: Network Security and Data Privacy Protection Survey

Verified

Added on  2023/06/16

|14
|3790
|402
Report
AI Summary
This literature survey analyzes published research on network security and data privacy protection, focusing on the benefits of network security in protecting data privacy. It addresses challenges like data utilization while safeguarding individual privacy and identifiable information. The survey covers network security essentials, emphasizing its role in protecting assets, gaining a competitive edge, and complying with regulations. It also discusses data privacy protection strategies, including data backup, disaster recovery, and personal information security. The benefits of network security, such as information protection, external network security, regulatory compliance, and prevention of network attacks, are explored. Finally, the survey highlights challenges like data breaches, authentication issues, and vulnerabilities in cloud computing environments. The report identifies a research problem related to securing data in cloud environments.
Document Page
Running head: NETWORK SECURITY AND DATA PRIVACY PROTECTION
Literature Survey: Network Security and Data Privacy Protection
Name of the Student:
Name of the University:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
NETWORK SECURITY AND DATA PRIVACY PROTECTION
Table of Contents
1.0 Introduction................................................................................................................................2
2.0 Network security........................................................................................................................2
3.0 Data privacy protection..............................................................................................................3
4.0 Benefits of Network Security and Data Privacy Protection......................................................5
5.0 Challenges of Network Security and Data Privacy Protection..................................................7
6.0 Summary and conclusion...........................................................................................................8
7.0 Research problem......................................................................................................................9
References......................................................................................................................................11
Document Page
2
NETWORK SECURITY AND DATA PRIVACY PROTECTION
1.0 Introduction
The purpose of this literature survey is to analyze the published literature on network
security and data privacy protection. The scope of literature review is to analyze the benefits of
network security in relation to protection of data privacy. The selected topic is the aspect of the
information technology which deals with ability of the organization to resolve what and which
data are shared with the third parties (Lu et al. 2014). The significance of literature review is
address of the challenges associated with the security off network and privacy of data. The
challenge of the data privacy is utilization of data while protecting of the privacy of the
individuals in addition to identifiable information. The main aim is to provide of solutions to the
identified problems in the field of information technology.
2.0 Network security
According to Duan and Wang (2015), network security is critical for the financial health
of each and every organization. Over the past years, internet enabled businesses are improving
efficiency along with growth in their revenue. Network technology is considered as key
technology into different types of applications. The e-business applications allow the business
organization to lower the operating cost, streamline the business processes and increase into
customer satisfaction. As network is enabled to more users, therefore it becomes more vulnerable
to the security threats. Those threats affect the transactions of e-business. Zhang et al. (2015)
stated that network security is required in an organization to protect of the company’s assets,
gain of competitive advantage and comply with the regulatory requirements. The computer
network technology is developing rapidly, therefore development of the internet technology
Document Page
3
NETWORK SECURITY AND DATA PRIVACY PROTECTION
becomes quick and people are aware of importance of network security. Suo et al. (2013) argued
that it is the main issue in computing as it is increasing on regular basis. Security over the
network is started with authorization such as username as well as password. It consists of various
policies which are adopted by network administrator for preventing and monitoring of
unauthorized access to the system. In order to prevent of unauthorized access to the system,
Antivirus software is used to detect of malware from the network or system (Kang et al. 2015).
Anomaly is used to monitor the network and logged for audit functions into the system.
Throughout secure of the network is important as secure of computer and encrypted
messages. In order to secure the network, confidentiality and integrity are required to be
considered. Rhodes-Ousley (2013) cited that in confidentiality, the unauthorized person cannot
examine the data and in integrity, it is guaranteed that the data which is send by the sender are
not changed when it is received by the receiver. At the time of transferring of one node to
another, communication channel is not vulnerable to the attack. The hacker targets the
communication channel, gets the data and then decrypts it. Secure of the network is significantly
important as secure of the computers along with encrypts of the messages (Sicari et al. 2015). It
becomes important due to inter connection of the computers and network.
3.0 Data privacy protection
Winkler and Rinner (2014) determined that data privacy protection is about secure of
data against the unauthorized access. It is an ethical issue within the organization which is
required to be solved on time. Data protection strategies ensure that the data are restored properly
after it has being lost and corrupted. Protection of data from compromise as well as ensure of the
data privacy are the key components into the data protection. Cao et al. (2014) illustrated that
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
NETWORK SECURITY AND DATA PRIVACY PROTECTION
data protection is used for describing the operational back up of the data and disaster recovery.
Proper protection of data ensures that when the data are lost and damaged, then the user can get
the data they required to operate the business (Roman, Zhou and Lopez 2013). Data storage
technologies are used to protect of the data includes of disk and tape backup that copies of
designated information to the disk storage. Cloud back up is used by the organization to move
sensitive information to the public cloud as back up. Virtualization also plays an important role
from copying of data at particular point to continuous protection of data (Skarmeta, Hernandez-
Ramos and Moreno 2014). On other hand, disaster recovery is focused on how the backup data
are used after happening of the disaster.
Data privacy protection is privacy of the personal information which is related to
personal storage of data into the computer system. Sadeghi, Wachsmann and Waidner (2015)
considered it as important aspect into the sharing of information. With advancement of the
technology, personal information is vulnerable to the users. In the recent years, issues of data
privacy and protection of personal data are rapidly increasing. Protective measures are to be
taken to prevent the data from unauthorized use of the sensitive information. All the data that are
shared among the internet is considered as privacy issues. A privacy program protects of the
informational assets which the organization maintains (Da Xu, He and Li 2014). This program is
focused on personal information that the organization is used to collect as well as maintain.
Document Page
5
NETWORK SECURITY AND DATA PRIVACY PROTECTION
4.0 Benefits of Network Security and Data Privacy Protection
Li, Ding and Conti (2015) stated that there are various challenges of network security and
data privacy protection. With use of network security system, the files and data along with
personal information is kept secured from unauthorized access present into the network.
Following are the benefits of network security:
Valuable protection of information: It helps to protect personal data of the existing client
on the network. It facilitates into protecting of information which is shared among the computer
network. The network contains of various confidential data such as personal client data which
are required to be kept secured (Saxena et al. 2017). Therefore, network security should be there
in order to protect the network and data privacy.
Protection of external network: Hacking and spyware attacks from the network are not able
to harm the physical computers. Therefore, harm of external network is being prevented. The
private network is protected from the external attacks by closing off from the internet. The
security of the network makes a secure environment from the attacks of the viruses. Plugging of
security into the network reduces the development cost and supported time (Garba et al. 2015).
By adding of security, it improves various software systems.
Outbreak of the regulations: The organization is begun to implement of new regulations
regarding data storage as well as electronic communications. The data protection ensures that the
information is secured into the files documents as well as system database. Into the IT
department, it complies of legal as well as industry restrictions on how the data are being
handled along with transmitted into the network (Sadeghi, Wachsmann and Waidner 2015). Each
Document Page
6
NETWORK SECURITY AND DATA PRIVACY PROTECTION
of the company has particular regulations which are set to improve the organizational efficiency.
The business can trust the security solutions to meet with the security compliance regulations.
Prevent of network attack: Most of the attacks on the network is due to the use of internet.
There are many hackers those are caused of virus attacks into the network. They steal lot of
information which is available within the network (Mollah, Azad and Vasilakos 2017). Network
security helps to prevent the attacks from being harm the computer system.
Level of access: The security software provides of various level of access to the users. The
user authentication is to be followed by the authorization techniques where it is being checked
whether the user are authorized to access to the resources. For maintaining the security of the
document, the shared documents are kept password protected. The software can know which of
the resources are to be accessible by whom (Liang et al. 2014). Password management improves
the data privacy protection on the computer network by setting of strong passwords and passes
codes on the devices which join of the network. There should be change into administrative
passcode for the network routers so that no other person can access to the network or system.
Central controlled: The central user known as network administrator can control the
software related to network security. The former is being prone to the worms while latter is
prevented hacker before it damages the system and network (Wei et al. 2014). It is because the
software is being installed into the machine which has no internet connection.
Centralized updates: It is required that the anti-virus software are to be updated on timely
basis. The old version of the software is not providing of required security against the attackers
(Saxena et al. 2017). A centralized network security system provides an advantage of timely
updates with no knowledge of individuals.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
NETWORK SECURITY AND DATA PRIVACY PROTECTION
Data encryption: In order to make the sensitive information more unreadable, the entities
can make it difficult for the unauthorized person to access the important and sensitive data.
When the network is accessed by unauthorized person, then data encryption is taken to encrypt
the data using strong password. The organizations are taken of preventive steps to keep data
secured throughout their business operations (Roman, Zhou and Lopez 2013). Entities are
implemented of solutions which use of existing system features like features of operating system.
5.0 Challenges of Network Security and Data Privacy Protection
The key challenges into the cloud computing are considered as network security as well
as privacy of the data. In the business organization, secured network becomes a key requirement
(Liang et al. 2014). On daily basis, the security threats are increasing which makes of higher
speed wireless network as well as internet services. Following are the security threats into the
network and data privacy:
Data breaches: The cloud environment is facing of threats into the network due to huge
amount of data are stored into the cloud server. It is such an incident where the sensitive,
protected in addition to confidential data are viewed potentially. Into the data breach, the attacker
hacks the important data and shared it over the internet. Data breaches are caused due to internal
and external stolen of information, data theft by the intruders and accidental disclosure of the
sensitive information (Sadeghi, Wachsmann and Waidner 2015). Traffic inspection is a security
approach which is used to block of sensitive data from moved out of local network. In this era of
advanced technology, it is a big challenge to protect of data against the leakage of data.
Credentials and authentication: Due to lack of authentication, data breaches as well as
attacks are resulted into loss of reputation of the business organization. Most of the developers
Document Page
8
NETWORK SECURITY AND DATA PRIVACY PROTECTION
have made a mistake to embed credentials as well as cryptographic keys into the source code and
then leaves them in the public facing repositories (Li, Ding and Conti 2015). Therefore, the keys
are protected as well as secured public key infrastructure is required.
Vulnerabilities: Due to advancement of the cloud computing there are increased of
vulnerabilities into the network. A buffer overflow occurs when the application attempts to write
the past data of buffer. It causes the data application to crash, compromise of data and provide of
attack vector in order to compromise of the system on which application is run (Roman, Zhou
and Lopez 2013). Sometimes, most of the file operations are not secured. Insecure file operations
include off write or read from the file within the location write by other user. The user are failed
to make right check for the file type. It fails to check the result code after the operation of file.
Malicious software: Both viruses as well as worms are common form of the malware as
well as malicious software. It infects the system without consent of the owner and then it creates
duplicates of codes which spread into the programs in addition to computers. The effects of the
malicious software are to damage the database along with software (Mollah, Azad and Vasilakos
2017). Most dangerous way is to threaten the data privacy by opening of backdoor for the
attackers to access of the passwords, personal information and data along with IP addresses. It
affects the vulnerabilities of the system and network server.
6.0 Summary and conclusion
With the growth of internet, network as well as data security becomes a key concern into
the organization where internal private network are connected with the internet. It is concluded
that network security attempts to provide of confidentiality and availability of the computing
system. The attacks related to network security are hardware, software as well as data. Data
Document Page
9
NETWORK SECURITY AND DATA PRIVACY PROTECTION
security is very important within the organization with strongest control over the network is
authentication, access of control along with encryption. It is analyzed that the benefit of network
security is important as it encrypts the message with stronger security password helps to acquire
of robust security in the network. It maintains confidentiality to keep the secret information away
from unauthorized users. It checks for reliability of exchanged messages in order to authenticate
the messages of the users. Network security also helps to meet with regulatory compliances.
Passwords are effective system used to improve the network security.
7.0 Research problem
There are problems which caused by the identity spam where identity related information
into the digital identifies linked with the real world people. It is vital to differentiate fake from
the original one. The fact is that this type of information can be easily created but it leads to viral
distribution, therefore it becomes difficult to stop and erase it. Social connections are making
spam credible as it becomes difficult to control the threats and challenges of network security
(Da Xu, He and Li 2014). The researchers are required to be carried out the study to understand
the types of challenges into the network with data privacy. The nature of problems into data
privacy and network security are addressing of various field of expertise, the point has made
various times with proper technical skills. The privacy leakages are caused problems to users, as
the false data leads to error results of security analysis. Most of the organizations are faced of
security problems and taken of action to focus on the data security issues (Mollah, Azad and
Vasilakos 2017). This research study provides an opportunity to reflect on the security and data
privacy issues relate to protection of data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
NETWORK SECURITY AND DATA PRIVACY PROTECTION
Kshetri (2013) stated that the security solutions are deployed to aggregate of security logs
as well as identify the potential breaches. The security data architecture becomes critical to
secure and attack. Back up of the data is required to prevent the data from being lost from the
system. Data virtualization also plays a key important role to copy data at exacting point to
constant protection of data (Sadeghi, Wachsmann and Waidner 2015). With the advanced
technology, day-by-day the security of the data becomes vulnerable, therefore strict password
management improves the data privacy protection on the computer network. Security over the
network is started with proper authorization so that no other person can access to the
unauthorized data.
Document Page
11
NETWORK SECURITY AND DATA PRIVACY PROTECTION
References
Cao, N., Wang, C., Li, M., Ren, K. and Lou, W., 2014. Privacy-preserving multi-keyword
ranked search over encrypted cloud data. IEEE Transactions on parallel and distributed
systems, 25(1), pp.222-233.
Da Xu, L., He, W. and Li, S., 2014. Internet of things in industries: A survey. IEEE Transactions
on industrial informatics, 10(4), pp.2233-2243.
Duan, X. and Wang, X., 2015. Authentication handover and privacy protection in 5G hetnets
using software-defined networking. IEEE Communications Magazine, 53(4), pp.28-35.
Garba, A.B., Armarego, J., Murray, D. and Kenworthy, W., 2015. Review of the information
security and privacy challenges in Bring Your Own Device (BYOD) environments. Journal of
Information privacy and security, 11(1), pp.38-54.
Kang, R., Dabbish, L., Fruchter, N. and Kiesler, S., 2015, July. my data just goes everywhere:”
user mental models of the internet and implications for privacy and security. In Symposium on
Usable Privacy and Security (SOUPS) (pp. 39-52). Berkeley, CA: USENIX Association.
Kshetri, N., 2013. Privacy and security issues in cloud computing: The role of institutions and
institutional evolution. Telecommunications Policy, 37(4), pp.372-386.
Li, Q., Ding, D. and Conti, M., 2015, September. Brain-computer interface applications: Security
and privacy challenges. In Communications and Network Security (CNS), 2015 IEEE Conference
on (pp. 663-666). IEEE.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]