SJIF: 6.217, IJIFACTOR: 3.8, RANKING: A+

Read More.

Call for Paper - January – 2026 Edition   

SJIF: 6.217, IJIFACTOR: 3.8, RANKING: A+

IJATCA solicits original research papers for the January – 2026 Edition.
Last date of manuscript submission is January 30, 2026.

A Review on Network Security and Privacy


Volume: 1 Issue: 2
Year of Publication: 2020
Pages: (48-51)
Authors: Diksha Gupta, Karnish Sharma, Neeshu Sharma




Abstract

In today’s world which is getting digitalized day by day and the data is increasing exponentially it becomes very important to check for the data security and privacy. As with the increasing data, the threat to that data is also increasing at the same rate. The data which is getting uploaded on the internet or any other network needs to be safe for the sake of the company’s private data or for the people who are using that network. In this paper the authors had discussed the various types of attacks, threats on the network from which the company or an individual needs to be careful to protect the company from any malicious activity. This paper also explores the various security measures to protect the data and offer proper security and privacy to it.

References

  1. L.Devi, S.P.Shantharajah, “A Survey on Authentication and security maintenance in wireless sensor network”, Vol.4 Issue.5, pp 53-70, May-2015

  2. M. Li, W. Lou, and K. Ren, \"Data security and privacy in wireless body area networks,\" in IEEE Wireless Communications, vol. 17, no. 1, pp. 51-58, February 2010

  3. K. Zeng, K. Govindan, and P. Mohapatra, \"Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks],\" in IEEE Wireless Communications, vol. 17, no. 5, pp. 56-62, October 2010

  4. SattarovaFeruza Y. and Prof. Tao-hoon Kim, “IT Security Review: Privacy, Protection, Access Control, Assurance and System Security,” International Journal of Multimedia and Ubiquitous Engineering Vol. 2, No. 2, pp. 17-32 April 2007

  5. Arpna Dhingra, S Mittal, H Kaur, A Singh “A Review on Techniques of Spam Classification in Twitter,” International Journal of Advanced Trends in Computer Applications (IJATCA) Volume 1, Number 5, May 2015, pp. 57-59 ISSN: 2395-3519

  6. Adrian Perrig, John Stankovic, David Wagner, “Security in wireless sensor networks,” Volume 47, Number 6, pp 53-57, 2004

  7. Shailja Pandey, ” Modern Network Security: Issues And Challenges”, Vol. 3, Uttar Pradesh Technical University, 2011

Keywords

Network security, virtual private network, network access control, firewall.