Network Security
Introduction
I
selected my final paper topic to be about Network Security because I am majoring
in Data and Cyber Security. I am not
only interested in the topic because of my major and the fact I don’t trust
easily, but also because computers and technology have always fascinated me. While
I admit I am a bit late to the game, I believe my curiosity and drive will serve
me well.
The Basics of Technological
Advancement
Keeping information secure is a vital part of using technology. As
technology advances, the need to secure information has become increasingly
more important. We are now a society
that keeps most of our vital information online, whether it be on a computer,
phone, tablet, or watch. Important and
private personal and business information of all kinds is kept online and
accessible to almost anyone with the knowledge to find it. Financial information, personal histories and
social security numbers, and almost all corporate information and
communications are kept online. This
information could wreak havoc if it fell into the wrong hands. With
technological advancements, threats are rapidly increasing, becoming more
creative and harder to detect (Nageab W. M. et al. 2024), which means network
security is more important than ever. A strong network security system utilizing the most current hardware and
software available and knowledgeable people running the systems is the best way
to ensure a strong network security system.
Types of Cyber Attacks
Cybercrimes
have increased in frequency and sophistication at an alarming rate (Ibekwe, U. U., et al., 2023). Over the years,
cyber attacks have changed with technological advancements and the number of
people who use computers. Malware, or
malicious software, is the most common type of cyber threat. Malware includes
multiple types of threats, including viruses, bots, and trojans. As technology
advanced and more people began using computers, threats morphed to include
human usage errors, such as spam, phishing, and social engineering. The best defense one can utilize against
these types of threats is using software such as virus protection and
firewalls, and making sure users are knowledgeable about current threats, how
to recognize them, and what to do when they have a possible threat.
Network Security and the Use of AI
Advanced Integration (AI) is the newest cyber threat everyone is struggling
to get in front of. While AI can be an
integral part of all network security systems, it is also being increasingly
used in cybercrimes and threats. Advanced
use of machine learning can assist computers in identifying potential threats much
quicker and more accurately than humans. Machine learning is the most important
part of using AI to combat cyber threats.
Machine learning should be continuous to allow the network to ingest as
much information as possible and to keep up to date with current advancements. AI is beneficial because it can also ingest
far more data quicker than humanly possible.
But AI and humans are also vulnerable to cyber threats such as data
manipulation and denial of service (DoS) attacks. While no network system is totally secure,
utilizing the most up-to-date security software, including firewalls, and having
a robust hardware system with fast processors and ample memory will help keep
systems as safe as possible.
Network Architecture, Management, and
Security
Creating
a sufficient infrastructure is a massive undertaking. To ensure one’s network security is on point,
all aspects must work together at their highest capabilities. This means that the network needs to have
fast processors, enough RAM to run multiple programs concurrently, and enough
storage or servers for all necessary data. All software and hardware need to be
kept up to date and functioning at the highest level possible to ensure the
network runs smoothly. Every network
also requires an intelligent and knowledgeable person running the system and
ensuring all aspects are functioning properly and kept up to date. Without all of these things, a network system
and its security will not be at its optimum level.
References
Nageab, W. M., Alrasheed, R., &
Khalifa, M. (2024). Cybersecurity in the Era of Artificial Intelligence: Risks
and Solutions. 2024 ASU Internation Conference in Emerging Technologies for
Sustainability and Intelligent Systems (ICETSIS), Emerging Technologies for Sustainability and
Intelligent Systems https://doi.org/10.1109/ICETSIS61505.2024.10459584
Ibekwe, U. U., Mbanaso, U. M.,
& Nnanna, N. A. (2023) A Critical Review of the Intersection of Artificial
Intelligence and Cybersecurity. 2023 2nd International Conference
on Multidisciplinary Engineering and Applied Science (ICMEAS),
Multidisciplinary Engineering and Applied Science (ICMEAS), 2023 2nd
International Conference On, 1, 1-6.
https://doi.org/10.1109/ICMEAS58693.2023.10379362
Rege, P. R., Kalnawat, A., Dhablia,
A., Sharma, R., Kaldoke, R. S., & Ashtagi, R. (2024). Exploring Machine
Learning’s Role in Intrusion Detection Systems for Network Security. 2024
International Conference on Emerging Smart Computing and Informatics (ESCI),
Emerging Smart Computing and Informatics (ESCI), 2024 International Conference
On, 1–6. https://doi.org/10.1109/ESCI59607.2024.10497357
Abu Bakar, R., & Kijsirikul, B.
(2023). Enhancing Network Visibility and Security with Advanced Port Scanning
Techniques. Sensors (14248220), 23(17), 7541. https://doi.org/10.3390/s23177541
Ugwunna, C. O.; Chukwuogo, O. E.;
Alabi, O. A.; Kareem, M. K.; Belonwu, T. S.; Oloyede, S. O. International
Research Journal of Science, Technology, Education, & Management
(IRJSTEM). Dec 2023, Vol. 3 Issue 4, p104-121. 18p. DOI:
10.5281/zenodo.10516267
Comments
Post a Comment