Downloads: 176 | Views: 325 | Weekly Hits: ⮙6 | Monthly Hits: ⮙1
Review Papers | Computer Science & Engineering | Tanzania | Volume 8 Issue 2, February 2019 | Popularity: 7.2 / 10
Network Security: A Brief Overview of Evolving Strategies and Challenges
Francis Aidan Ruambo
Abstract: Network Security strategies evolves parallel with the advancement and development of computer systems and services. The ubiquity of ICT devices and services offers undeniable efficiency in executing our daily routine activities. Challenges in the aspects of security and continuous availability of the ICT resources and services, trigger the evolution of network security strategies. In this review paper, a brief overview of evolving strategies adopted within the dynamic paradigm of network security is highlighted and challenges are reviewed. Additionally, interesting areas for future research in securing the computer network ecosystem are suggested. The review finds that, as long as computer systems and services are dynamically evolving, then the network security strategies will also continue to be an evolving and volatile paradigm. In order to enhance network security, there is a need of incorporating new innovative strategies whilst embracing network security best practices and principles to mitigate appropriately the evolving threats within the computer network ecosystem.
Keywords: Network Security, Computer Networks, Security Management, Internet of Things
Edition: Volume 8 Issue 2, February 2019
Pages: 834 - 841
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 1058 - 1062Comprehensive Research on Cyber - Attacks and Cyber Security
Sonam Khatri
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 4, April 2024
Pages: 285 - 288Anomaly Detection of Financial Data using Machine Learning
Khirod Chandra Panda
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 1497 - 1500Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 779 - 789Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure
Surbhi Batra, Chandra Sekhar Dash
Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024
Pages: 1927 - 1929Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix
Tahir Bashir