International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 176 | Views: 325 | Weekly Hits: ⮙6 | Monthly Hits: ⮙1

Review Papers | Computer Science & Engineering | Tanzania | Volume 8 Issue 2, February 2019 | Popularity: 7.2 / 10


     

Network Security: A Brief Overview of Evolving Strategies and Challenges

Francis Aidan Ruambo


Abstract: Network Security strategies evolves parallel with the advancement and development of computer systems and services. The ubiquity of ICT devices and services offers undeniable efficiency in executing our daily routine activities. Challenges in the aspects of security and continuous availability of the ICT resources and services, trigger the evolution of network security strategies. In this review paper, a brief overview of evolving strategies adopted within the dynamic paradigm of network security is highlighted and challenges are reviewed. Additionally, interesting areas for future research in securing the computer network ecosystem are suggested. The review finds that, as long as computer systems and services are dynamically evolving, then the network security strategies will also continue to be an evolving and volatile paradigm. In order to enhance network security, there is a need of incorporating new innovative strategies whilst embracing network security best practices and principles to mitigate appropriately the evolving threats within the computer network ecosystem.


Keywords: Network Security, Computer Networks, Security Management, Internet of Things


Edition: Volume 8 Issue 2, February 2019


Pages: 834 - 841



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Francis Aidan Ruambo, "Network Security: A Brief Overview of Evolving Strategies and Challenges", International Journal of Science and Research (IJSR), Volume 8 Issue 2, February 2019, pp. 834-841, https://www.ijsr.net/getabstract.php?paperid=ART20194980, DOI: https://www.doi.org/10.21275/ART20194980



Similar Articles

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 1058 - 1062

Comprehensive Research on Cyber - Attacks and Cyber Security

Sonam Khatri

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 4, April 2024

Pages: 285 - 288

Anomaly Detection of Financial Data using Machine Learning

Khirod Chandra Panda

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra, Chandra Sekhar Dash

Share this Article

Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5

Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024

Pages: 1927 - 1929

Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix

Tahir Bashir

Share this Article



Top