Computer Network Security and Technology |
||
|
|
|
© 2023 by IJCTT Journal | ||
Volume-71 Issue-5 |
||
Year of Publication : 2023 | ||
Authors : Narangerel. TS, Dolgorsuren. T | ||
DOI : 10.14445/22312803/IJCTT-V71I5P113 |
How to Cite?
Narangerel. TS, Dolgorsuren. T, "Computer Network Security and Technology," International Journal of Computer Trends and Technology, vol. 71, no. 5, pp. 80-84, 2023. Crossref, https://doi.org/10.14445/22312803/IJCTT-V71I5P113
Abstract
The development of Information technology has granted users the opportunity to work in a network and the Internet. Due to this, risks regarding the safety of computer networks have arisen. These issues generally concern system security and information security. It is a matter of reliability, privacy, integrity, and access to information in the network environment. This research addresses network security technology such as authentication, encryption, firewall technology, intrusion detection system (IDS), antivirus technology and virtual private network (VPN). Issues regarding network security should assess such network issues, prevent various attacks, and ensure network security.
Keywords
Over-the-top (OTT), Streaming, Media, SmartTV, Mobile, SVOD, AVOD, TVOD, AI/ML.
Reference
[1] A. Hess, and G. Schafter, “Realizing a Flexible Access Control Mechanism for Active Nodes Based on Active Networking Technology,” IEEE International, vol. 1, pp. 68-72, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Cristina L. Abad, and Rafael I. Bonilla, “An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks,” 27Th International Conference on Distributed Computing Systems Workshops, pp. 60, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[3] S. Yongjie, “Research on Communication Encryption Technology of Network Security,” Telecom Power Technology, 2014.
[Google Scholar]
[4] B. Endicott, “Active Defense to Cyber Attacks,” Information Assurance and Security, 2014.
[5] L.D. Peng, “Network Security and Firewall Technology,” Proceedings of 2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010), no. 2, 2012.
[6] A. Mayer, A. Wool, and E. Ziskind, “Fang: A Firewall Analysis Engine,” IEEE Symposium on Security and Privacy, pp. 177-187, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[7] T.B. Bec, “Remote Control Euphoria,” Americas Edition: Telecommunications (Americas Edition), vol. 38, no. 10, pp. 10-11, 2004
[8] James P. Anderson, “Computer Security Threat Monitoring and Surveillance,” Technical Report, James P. Anderson Company, 1980.
[Google Scholar] [Publisher Link]
[9] W. Xiaolin, “Study on Computer Network Antivirus Mechanism based on Antivirus Software,” Network Security Technology & Application, 2014.
[Google Scholar]
[10] Narangerel Ts, "E-Commerce Security Issues," International Journal of Computer Trends and Technology, vol. 70, no. 4, pp. 25- 28, 2022.
[CrossRef] [Publisher Link]
[11] J.W.Yang, “A Brief Analysis of Computer Network Security Precautions in the Era of Big Data,” Science and Technology Communication, no. 2, pp. 108-109, 2019.
[12] Z.H. Long, “Computer Network Information Security and Protection Strategy in the ERA of Big Data,” Management Informationization in China, no.3, pp.161-162, 2019.
[Google Scholar]
[13] Q.F. Deng, “Computer Network Information Security Technology and its Development Trend,” Electronic Technology and Software Engineering, no. 24, pp. 194-195, 2019.
[Google Scholar]
[14] W. Liu, “Research on Optimizing Network Security Strategy Based on Big Data,” Software, vol. 39, no. 9, pp. 205-208, 2018.
[15] L. Zhao, “Research on Computer Network Security Protection Strategy under the Background of Big Data,” Journal of Heihe University, vol. 10, no. 1, pp. 217-218, 2019.
[16] Q.Wang, and C.Pan, “Analysis of Network Complete Vulnerabilities and Preventive Measures in the Era of Big Data,” Network Security Technology and Application, no. 2, pp. 77-79, 2017.
[17] L.J. Bao, “Application of Big Data-based Network Security Situation Awareness Platform in Private Network Field,” Information Security Research, vol. 5, no. 2, pp. 168-175, 2019.
[18] B. Wang, “Network Security Fuzzy Risk Assessment Based on Computer Network Technology,” Foreign Electronic Measurement Technology, vol. 38, no. 5, pp. 11-16, 2019.
[19] Q. Liu et al., “Research on the Framework and Methods of Network Security Detection,” Computer Engineering and Science, vol. 39, no. 12, pp. 2224-2229, 2017.
[20] Biswajit Tripathy, and Jibitesh Mishra, “Protective Measures in e-commerce to deal with Security Threats Arising out of Social Issues – a Framework,” International Journal of Computer Engineering and Technology (IJCET), vol. 4, no. 1, pp. 46-53, 2013.
[Google Scholar] [Publisher Link]
[21] Pooman Patel, and Kamaljeet I. Lakhtaria “A Study on e-Commerce security Threats” IJIRSCE, vol. 5, no. 3, 2017.
[22] W. Xiang, “Research on Hierarchical Structure and Linkage of Network and Information Security Emergency Response System,” Network Security Technology and Application, pp. 177-179, 2015.
[23] L. Hailong, “Discussion on Network Security Emergency Response Mechanism in Colleges and Universities,” Industry and Technology Forum, vol. 19, no. 15, pp. 277-278, 2020.
[24] H. Daoli, and Y. Hao, “Legal Protection of Network Security Emergency Response of China's key Information Infrastructure,” China Information Security, pp. 42-43, 2020.
[25] D. Yuanyuan, “Research on Network Security Incident Emergency Response Linkage System,” Wireless Internet Technology, pp. 47-48, 2017.
[26] L. Feng, “Network Security Situation Awareness and Emergency Response Platform Solution,” Information Technology and Standardization, pp. 16-18, 2018.