Open Access Open Access  Restricted Access Subscription or Fee Access

A Writing Survey of Network Safety

Soumen Chakraborty

Abstract


The term network safety is frequently utilized reciprocally with the term assurance of data. This paper contends that while network safety and data security are altogether comparative, these two terms are not totally equivalent. The paper also contends that network safety extends past regular data security definitions to incorporate the assurance of data information, yet in addition to that of different properties, including the singular itself. In data security, reference to the human component is by and large connected to the human's role(s) during the time spent on assurance. In network safety this viewpoint has a further component, to be specific, people as potential focuses of digital assaults or in any event, connecting unwittingly in a digital attack. This extra perspective has moral ramifications for society in general, as it very well might be viewed as a social commitment to safeguard such underestimated gatherings, for instance, children.


Full Text:

PDF

References


Whitman ME, Mattord HJ. Principles of Information Security. Boston, MA: Cengage Learning; 2021.

Yamin MM, Katt B, Gkioulos V. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Computers & Security. 2020 Jan 1;88:101636.

Khan MA, Salah K. IoT security: Review, blockchain solutions, and open challenges. Future generation computer systems. 2018 May 1;82:395-411.

Lee C, Yim HB, Seong PH. Development of a quantitative method for evaluating the efficacy of cyber security controls in NPPs based on intrusion tolerant concept. Annals of Nuclear Energy. 2018 Feb 1;112:646-54.

Srinivas J, Das AK, Kumar N. Government regulations in cyber security: framework, standards and recommendations.. Future Gener Comput Syst. 2019; 92: 178–188.

Venter IM, Blignaut RJ, Renaud K, Venter MA. Cyber security education is as essential as “the three R's”. Heliyon. 2019 Dec 1;5(12):e02855.

Cheung KF, Bell MG. Attacker–defender model against quantal response adversaries for cyber security in logistics management: An introductory study. European Journal of Operational Research. 2021 Jun 1;291(2):471-81.

Ferrag MA, Maglaras L, Moschoyiannis S, Janicke H. Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study. J Inform Secur Appl. 2020; 50 (C). doi: 10.1016/j.jisa.2019.102419.

Vinayakumar R, Alazab M, Soman KP, Poornachandran P, Al-Nemrat A, Venkatraman S. Deep learning approach for intelligent intrusion detection system. IEEE Access. 2019; 7: 41525–41550.

Li X, Jiang P, Chen T, Luo X, Wen Q. A survey on the security of blockchain systems. Future Gener Comput Syst. 2020;107: 841–853.

Wood AD, Stankovic JA. Security of distributed, ubiquitous, and embedded computing platforms. Wiley Handbook of Science and Technology for Homeland Security, John Wiley & Sons (March 2010). 2010.


Refbacks

  • There are currently no refbacks.