Addressing the Key Issues in Network Security

Nwile Beauty NukaRivers State University, Department of Computer Science, Port Harcourt-NigeriaDaniel MatthiasRivers State University, Department of Computer Science, Port Harcourt-Nigeria

Vol 10 No 4 (2026): Volume 10, Issue 4, April 2026 | Pages: 328-331

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 30-04-2026

doi Logo doi.org/10.47001/IRJIET/2026.104047

Abstract

Network security is an essential aspect of modern business and organizations. It is important to implement a comprehensive security strategy that includes firewalls, intrusion detection and prevention systems, encryption, and regular security updates. Additionally, access controls and authentication mechanisms must be implemented to ensure that only authorized users have access to sensitive information. Network security is an ongoing process that requires constant monitoring and updating to stay ahead of emerging threats.

Keywords

Network Security, Malicious Attacks, Intrusion Detection


Citation of this Article

Nwile Beauty Nuka, & Daniel Matthias. (2026). Addressing the Key Issues in Network Security. International Research Journal of Innovations in Engineering and Technology - IRJIET, 10(4), 328-331. Article DOI https://doi.org/10.47001/IRJIET/2026.104047

References
  1. Benecke, C. (1999). A parallel packet screen for high speed networks, in Proceedings of the 15th Annual Computer Security Applications Conference.
  2. O’Reilly, 2000A. Wool, “A quantitative study of firewall configuration errors,” IEEE Computer, 3(6). 62 –67, June.
  3. Fulp,E. W. (2005) Optimization of network firewall policies using directed a cyclical graphs,” in Proceedings of the IEEE Internet Management Conference (IM’05), 2005.
  4. Paul, O. and M. Laurent, “A full bandwidth ATM firewall,” in Proceedings of the 6th European Symposium on Research in Computer Security ESORICS’2000, 2000.
  5. Ziegler, R.  (2002) Linux Firewalls, 2nd ed. New Riders.
  6. Zwicky, E. D.  Cooper, S.  and Chapman, D. B.  (2004) Building Internet Firewalls.
  7. Ziegler. R. L.  (2002). Linux Firewalls. New Riders, second edition.