ISSN No. 0975-0312
Vedic Science International Multidisciplinary Peer-reviewed Journal
Article Information
Journal: Vedic Science
Volume: 28 | Issue: 1 | Year: 2026
Pages: 51–58
DOI: https://doi.org/10.66718/vsj.v28.i1.06
Received: 20 Feb. 2026
Accepted: 18 March, 2025
Published: 20 April, 2025
COMPUTER NETWORK SECURITY & TECHNOLOGY
Dr. Devkumar Gole, Kaliachak B.K.A Sanskrit Mahavidyalaya, Kaliachak, Purba Medinipur, Pin-721430, W.B
Abstract
By writing this paper a small effort has been put to understand the growing network needs and its security. Various types of network threats and security services are discussed. Many security devices are being developed and deployed to defend against cyber threats and to prevent unintended data breaches. Network security has become more important to personal computer users, organizations, and the military. This research addresses network security technology such as authentication, encryption, firewall technology, intrusion detection system (IDS), antivirus technology and virtual private network (VPN). With the continuous development of internet, people cannot live without computers and networks. However, in the process of using network, there are often a lot of security problems. Computer networks are essential part of our life by which we can share the information through different technologies like wired or wireless networks. Now a day wireless technologies are adopted because of its advantages and secured information transmission. Within this paper I will talk to you about the importance of network security and how it can change your day-to-day life using cyber security. It is recommended to hire a professional team to check in time, popularize security knowledge, change passwords, download and purchase network firewalls Software, timely discovery of security vulnerabilities, and the government's introduction of cyber security laws.
Keywords
Network Security, Internet, Data Security, Cyber Security, Network Security, Security threats.
References
- Edu. (n.d.). Network security and cyber security: A review. https://www.academia.edu/83766623/Network_Security_and_Cyber_Security_A_Review
- ADMI USA. (2024). Proceedings paper UP5. http://www.admiusa.org/admi2024/ADMIProceedings/UP5.pdf
- Network security assessment: A guide. (n.d.). https://www.firemon.com/blog/network-security-assessment-a-guide/#types-of-security-assessments-for-networks
- Inderscience Publishers. (n.d.). International Journal of Network Security. https://www.inderscience.com/jhome.php?jcode=ijnsec
- International Journal of Computer Trends and Technology. (2023). Article V71I5P113. https://ijcttjournal.org/2023/Volume-71%20Issue-5/IJCTT-V71I5P113.pdf
- International Journal of Scientific Research Publications (IJSRP). (2013). Research paper P20131. https://www.ijsrp.org/research-paper-0813/ijsrp-p20131.pdf
- Journal of Physics: Conference Series article (1992/3/032069). https://iopscience.iop.org/article/10.1088/1742-6596/1992/3/032069/pdf
- Research article (Volume 2, Issue 6) (2020). https://www.irjmets.com/uploadedfiles/paper/volume2/issue_6_june_2020/1803/1628083058.pdf
- Network security standards. (n.d.). https://nordvpn.com/blog/network-security-standards/
- What are the types of network security systems? (n.d.). https://www.quora.com/What-are-the-types-of-network-security-systems
- What is the concept of network security? (n.d.). https://www.quora.com/What-is-the-concept-of-network-security
- Networking and security measures. (n.d.). https://www.researchgate.net/publication/265141277_Networking_and_Security_Measures
- Article (S1877050922015204). (n.d.). https://www.sciencedirect.com/science/article/pii/S1877050922015204/pdf
- Stamus Networks. (n.d.). What are the 4 types of attacks in network security? https://www.stamus-networks.com/blog/what-are-the-4-types-of-attacks-in-network-security
- Stanford University. (2011). Introduction to computer security (CS155 lecture notes). https://crypto.stanford.edu/cs155old/cs155-spring11/lectures/01-intro-thompson.pdf
How to cite this article
Gole, D. (2026).COMPUTER NETWORK SECURITY & TECHNOLOGY . Vedic Science, 2026 (1), 51–58. ISSN: 0975-0312. DOI: https://doi.org/10.66718/vsj.v28.i1.06
Copyright (c) 2026 by the Author/s
This article is published under the License (CC BY 4.0).