A Systematic Review of Network Security Breaches and Solutions
Ravi Tomar1, Yogesh Awasthi2
1Ravi Tomar, Department of Engineering & Technology, Shobhit Institute of Engineering & Technology, Meerut, India.
2Yogesh Awasthi, Department of Engineering & Technology, Shobhit Institute of Engineering & Technology, Meerut, India.
Manuscript received on August 19, 2020. | Revised Manuscript received on August 28, 2020. | Manuscript published on September 10, 2020. | PP: 334-338 | Volume-9 Issue-11, September 2020 | Retrieval Number: 100.1/ijitee.K78120991120 | DOI: 10.35940/ijitee.K7812.0991120
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Cyber Security is the protection of unauthorized access of the information. Different threat and issues are present in the network which stole unpredictable amount of data every year. For the information technology and computer systems, a cyber security rule is required to compel different group as well as businesses to secure their systems and information from cyber-attacks. In the healthcare sector huge amount of data can be theft every year which is dangerous for both government and personal view. The technical advancements have increased the risk’s potential in the network in Cloud and Cyber. Security & privacy cracks are the vital issues which need to mitigate to maintain the dignity of the network. This paper conducted a review to secure the network from network security issues. There are various attacks which are vulnerable to the network like DoS, DDoS and Spoofing. These attacks have been described to identify the attacker’s capability. In order to facilitate this, networks such as cloud, ad-hoc, cyber has been described to determine the security, a paradigm. A literature from past studies has been conducted to identify the threats and their behavior. Different types of attacks and their behavior is also studied, and a tabular structure is also presented for better understanding.
Keywords: Security, Attacks, Breaches, DDoS.