Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Current Computer Network Security Issues/Threats

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Ammar Yassir, Alaa A. K. Ismaeel

Ammar Yassir and Alaa A K Ismaeel. Current Computer Network Security Issues/Threats. International Journal of Computer Applications 155(1):1-5, December 2016. BibTeX

	author = {Ammar Yassir and Alaa A. K. Ismaeel},
	title = {Current Computer Network Security Issues/Threats},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2016},
	volume = {155},
	number = {1},
	month = {Dec},
	year = {2016},
	issn = {0975-8887},
	pages = {1-5},
	numpages = {5},
	url = {},
	doi = {10.5120/ijca2016912255},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Computer network security has been a subject of concern for a long period. Many efforts have been made to address the existing and emerging threats such as viruses and Trojan among others without any significant success. Worse, new issues and threats have been emerging given that technology changes and becomes obsolete in a short while. In this regard, this research delves into the current network security issues in order to give future directions of research in a bid to help security technologists know where to focus their resources. This research examines the threats in terms of whether they are hardware or software issues. The need of this research is well articulated with the current security threats and countermeasures clearly outlined. The research found the following as the current major security threats: social engineering and phishing, malware infiltration through external hardware and removable media, malware infection through intranet and Internet, invasion through remote access, human sabotage or error, DDoS attacks, and cloud and extranet components being compromised.


  1. Libicki, M.C. and Ablon, L. and Webb, T., The Defenders Dilemma: Charting a Course Toward Cybersecurity, ser. Research report (Rand Corporation). RAND Corporation, 2015. [Online]. Available:
  2. Meier, JD and Mackman, Alex and Dunner, Michael and Vasireddy, Srinath and Escamilla, Ray and Murukan, Anandha, “Improving web application security: threats and countermeasures,” Microsoft Corporation, vol. 3, 2003.
  3. Geetha, S. and Phamila, Asnath Victy, Combating Security Breaches and Criminal Activity in the Digital Sphere, ser. Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2016. [Online]. Available: com/Combating-Security-Breaches-Forensics-Terrorism/dp/ 1522501932
  4. Taylor, Harriet, “Biggest cybersecurity threats in 2016,” October 2016, threats-in-2016.html.
  5. Himma, Kenneth E., Internet Security: Hacking, Counterhacking, and Society. Jones & Bartlett Learning, 2007. [Online]. Available: M5d-yuCME0AC
  6. R. Valecha, R. Chen, T. Herath, A. Vishwanath, J. Wang, and R. Rao, “An exploration of phishing information sharing: A heuristic-systematic approach,” 2015.
  7. Parsons, June Jamrich, New Perspectives Computer Concepts 2016 Enhanced, Comprehensive. Cengage Learning, 2016. [Online]. Available: epZ4CgAAQBAJ
  8. E. E. Lastdrager, “Achieving a consensual definition of phishing based on a systematic review of the literature,” Crime Science, vol. 3, no. 1, p. 1, 2014.
  9. Allen, Malcolm, “Social engineering a means to violate a computer system,” 2016, whitepapers/engineering/social-engineering-meansviolate- computer-system-529.
  10. Federal Office for Information and Security, “ndustrial control system security: Top 10 threats and countermeasures 2016,” 12 October 2016, whitepapers/engineering/social-engineering-meansviolate- computer-system-529.
  11. Franklin, D.N., “Detecting malicious software,” Feb. 10 2015, uS Patent 8,955,118. [Online]. Available: https: //
  12. J. Andress and S.Winterfeld, Cyber warfare: techniques, tactics and tools for security practitioners. Elsevier, 2013.
  13. Suleiman, Husam and Alqassem, Israa and Diabat, Ali and Arnautovic, Edin and Svetinovic, Davor, “Integrated smart grid systems security threat model,” Information Systems, vol. 53, pp. 147 – 160, 2015. [Online]. Available: http://www.
  14. Vacca, John R., Network and System Security, Second Edition, 2nd ed. Syngress Publishing, 2013.
  15. Jacobson, Doglas, Introduction to Network Security, ser. Chapman & Hall/CRC Computer and Information Science Series. CRC Press, 2008. [Online]. Available: https: //
  16. Ma, Zongmin, Managing Big Data in Cloud Computing Environments. Hershey, PA,, 2016. [17] Roozbahani, Fatemeh Soleimani and Azad, Reihaneh, “Security solutions against computer networks threats,” International Journal of Advanced Networking & Applications, vol. 7, no. 1, pp. 25–76, July 2015.
  17. Bohli, J. M. and Gruschka, N. and Jensen, M. and Iacono, L. L. and Marnau, N., “Security and privacy-enhancing multicloud architectures,” IEEE Transactions on Dependable and Secure Computing, vol. 10, no. 4, pp. 212–224, July 2013.
  18. Pathan, Al-Sakib Khan, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET, 1st ed. Boston, MA, USA: Auerbach Publications, 2016.


Computer Networks, Security, Threat, Attack