<p>The paper aims to raise awareness in the domain of security and privacy concerns in network communication that takes place among machines. Knowing that there are lots of possibilities that an attacker or hacker may get a slight chance of causing exploits from network vulnerabilities leads to threats at personal and organizational level. In this paper, research has been carried out using survey methodology to gather user viewpoints on general awareness and importance of network security and privacy. The results will be used to support the overall significance of how a network should behave and work on behalf of the users. The main goal as developers and engineers is to prioritize and improve user satisfaction and data protection standard. Therefore, this paper will also discuss the methodologies and possible ways to offer the best strategies for protection against security and privacy attacks. </p>
<p>The paper aims to raise awareness in the domain of security and privacy concerns in network communication that takes place among machines. Knowing that there are lots of possibilities that an attacker or hacker may get a slight chance of causing exploits from network vulnerabilities leads to threats at personal and organizational level. In this paper, research has been carried out using survey methodology to gather user viewpoints on general awareness and importance of network security and privacy. The results will be used to support the overall significance of how a network should behave and work on behalf of the users. The main goal as developers and engineers is to prioritize and improve user satisfaction and data protection standard. Therefore, this paper will also discuss the methodologies and possible ways to offer the best strategies for protection against security and privacy attacks. </p>
This paper aims to discuss the standard guidelines of the development process of secure software and will give justification on different types and ways of the software development processes. Additionally, a survey is conducted, the aim of which is to observe user behavior towards software system usage, user attitude in terms of privacy and policy awareness, security and privacy concerns. This is followed by discussion on how to secure software systems in development stage.
This paper aims to discuss the standard guidelines of the development process of secure software and will give justification on different types and ways of the software development processes. Additionally, a survey is conducted, the aim of which is to observe user behavior towards software system usage, user attitude in terms of privacy and policy awareness, security and privacy concerns. This is followed by discussion on how to secure software systems in development stage.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.