TEC101 Post #7 - Network Security

 Network Security

 

Introduction

            I selected my final paper topic to be about Network Security because I am majoring in Data and Cyber Security.  I am not only interested in the topic because of my major and the fact I don’t trust easily, but also because computers and technology have always fascinated me. While I admit I am a bit late to the game, I believe my curiosity and drive will serve me well.

 

The Basics of Technological Advancement

Keeping information secure is a vital part of using technology. As technology advances, the need to secure information has become increasingly more important.  We are now a society that keeps most of our vital information online, whether it be on a computer, phone, tablet, or watch.  Important and private personal and business information of all kinds is kept online and accessible to almost anyone with the knowledge to find it.  Financial information, personal histories and social security numbers, and almost all corporate information and communications are kept online.  This information could wreak havoc if it fell into the wrong hands.  With technological advancements, threats are rapidly increasing, becoming more creative and harder to detect (Nageab W. M. et al. 2024), which means network security is more important than ever. A strong network security system utilizing the most current hardware and software available and knowledgeable people running the systems is the best way to ensure a strong network security system.

 

 

Types of Cyber Attacks

            Cybercrimes have increased in frequency and sophistication at an alarming rate (Ibekwe, U. U., et al., 2023). Over the years, cyber attacks have changed with technological advancements and the number of people who use computers.  Malware, or malicious software, is the most common type of cyber threat. Malware includes multiple types of threats, including viruses, bots, and trojans. As technology advanced and more people began using computers, threats morphed to include human usage errors, such as spam, phishing, and social engineering.  The best defense one can utilize against these types of threats is using software such as virus protection and firewalls, and making sure users are knowledgeable about current threats, how to recognize them, and what to do when they have a possible threat.

 

Network Security and the Use of AI

 

Advanced Integration (AI) is the newest cyber threat everyone is struggling to get in front of.  While AI can be an integral part of all network security systems, it is also being increasingly used in cybercrimes and threats.  Advanced use of machine learning can assist computers in identifying potential threats much quicker and more accurately than humans. Machine learning is the most important part of using AI to combat cyber threats.  Machine learning should be continuous to allow the network to ingest as much information as possible and to keep up to date with current advancements.  AI is beneficial because it can also ingest far more data quicker than humanly possible.  But AI and humans are also vulnerable to cyber threats such as data manipulation and denial of service (DoS) attacks.  While no network system is totally secure, utilizing the most up-to-date security software, including firewalls, and having a robust hardware system with fast processors and ample memory will help keep systems as safe as possible.

 

Network Architecture, Management, and Security

            Creating a sufficient infrastructure is a massive undertaking.  To ensure one’s network security is on point, all aspects must work together at their highest capabilities.  This means that the network needs to have fast processors, enough RAM to run multiple programs concurrently, and enough storage or servers for all necessary data. All software and hardware need to be kept up to date and functioning at the highest level possible to ensure the network runs smoothly.  Every network also requires an intelligent and knowledgeable person running the system and ensuring all aspects are functioning properly and kept up to date.  Without all of these things, a network system and its security will not be at its optimum level. 

 

References 

Nageab, W. M., Alrasheed, R., & Khalifa, M. (2024). Cybersecurity in the Era of Artificial Intelligence: Risks and Solutions. 2024 ASU Internation Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS),  Emerging Technologies for Sustainability and Intelligent Systems  https://doi.org/10.1109/ICETSIS61505.2024.10459584

 

Ibekwe, U. U., Mbanaso, U. M., & Nnanna, N. A. (2023) A Critical Review of the Intersection of Artificial Intelligence and Cybersecurity. 2023 2nd International Conference on Multidisciplinary Engineering and Applied Science (ICMEAS), Multidisciplinary Engineering and Applied Science (ICMEAS), 2023 2nd International Conference On, 1, 1-6.  https://doi.org/10.1109/ICMEAS58693.2023.10379362

 

Rege, P. R., Kalnawat, A., Dhablia, A., Sharma, R., Kaldoke, R. S., & Ashtagi, R. (2024). Exploring Machine Learning’s Role in Intrusion Detection Systems for Network Security. 2024 International Conference on Emerging Smart Computing and Informatics (ESCI), Emerging Smart Computing and Informatics (ESCI), 2024 International Conference On, 1–6. https://doi.org/10.1109/ESCI59607.2024.10497357

 

Abu Bakar, R., & Kijsirikul, B. (2023). Enhancing Network Visibility and Security with Advanced Port Scanning Techniques. Sensors (14248220)23(17), 7541. https://doi.org/10.3390/s23177541

 

Ugwunna, C. O.; Chukwuogo, O. E.; Alabi, O. A.; Kareem, M. K.; Belonwu, T. S.; Oloyede, S. O. International Research Journal of Science, Technology, Education, & Management (IRJSTEM). Dec 2023, Vol. 3 Issue 4, p104-121. 18p. DOI: 10.5281/zenodo.10516267

Comments