Don't wanna be here? Send us removal request.
Text
MAJOR DEVELOPMENTS IN THE NETWORK AND INFORMATION SECURITY FIELD
Network security attacks is one thing that would remain a constant due to the relentless search of ways to launch attacks by cybercriminals. According to purplesec.us, cybercrime activities have risen by 600% since the inception of the covid-19 pandemic. This statistic indicates that cybercrime activities are at an all-time high, huge emphasis needs to be placed on how well networks of organizations or small businesses are secured. With the advancement of attacks, there are new major developments bursting out into the network and information security scene that helps further secure networks. For example, AI and machine learning are now becoming essential, as these technologies are capable of quickly analyzing millions of data sets and tracking down a wide variety of cyber threats from malware dangers to abnormal behavior that might result in a phishing attack. Another new development is the emergence of NGFW (Next Generation Firewall). These types of firewalls go beyond the traditional means to secure a network.
Artificial intelligence and machine learning are branches of computer science that is causing major impacts in not only the network and information security sphere but also in financial and entertainment field. It is the simulation of human intelligence processes by machines, especially computer systems. A typical example of a network security software that uses AI is “Intercept x”. this software uses a comprehensive, defense in depth approach to endpoint protection. The function of the AI in this software is to continually learn and improve, getting data from past experiences and present to locate new types of attacks that can occur today or tomorrow to consequently prevent them. In addition, this has reduced human effort in trying to prevent attacks due to AI technology embedded in the software.
Firewall is a basic protection technology that every network should have, in its basic form, it is a barrier between trusted and untrusted networks. Due to the changing threat landscape in recent times, the traditional firewalls are becoming obsolete consequently leading to the emergence of next generation firewalls. As the name suggests, the NGFW is a more advanced version of the traditional firewall. However, the main difference between NGFW and the traditional firewall is the deeply thorough inspection and prevention carried out by the NGFW, only this type can provide proper protection from the more advanced attacks.
In summary, networks are always going to be vulnerable to cyberattacks. however, proper, updated security tools should already be in place to circumvent these attacks.
References
· Belani, Gaurav. “The Use of Artificial Intelligence in Cybersecurity: A ReviewIEEE Computer Society.” IEEE Computer Society, IEEE Computer Society, https://www.computer.org/publications/tech-news/trends/the-use-of-artificial-intelligence-in-cybersecurity.
Accessed 27 Sept. 2021.
· Brook, Chris. “What Is a Next Generation Firewall? Learn about the Differences between NGFW and Traditional Firewalls | Digital Guardian.” Digital Guardian, 29 Sept. 2020, https://digitalguardian.com/blog/what-next-generation-firewall-learn-about-differences-between-ngfw-and-traditional-firewalls.
· Burns, Ed, et al. “What Is Artificial Intelligence (AI)? - AI Definition and How It Works.” SearchEnterpriseAI, TechTarget, 9 Aug. 2021, https://searchenterpriseai.techtarget.com/definition/AI-Artificial-Intelligence
· Purplesec. “2021 Cyber Security Statistics: The Ultimate List Of Stats, Data & Trends | PurpleSec.” PurpleSec, Purplesec, 8 Nov. 2020, https://purplesec.us/resources/cyber-security-statistics/.
· Swanagan, Michael. “How To Prevent The Top Cyber Attacks In 2021 | PurpleSec.” PurpleSec, Purplesec, 27 Nov. 2020, https://purplesec.us/prevent-cyber-attacks/#Prevent.
· “The Benefits Of Next Generation Firewalls - Smarttech247.” Smarttech247, https://www.facebook.com/smarttech247, 6 Aug. 2020, https://www.smarttech247.com/news/benefits-of-next-generation-firewalls-for-organisations/?utm_term=&utm_campaign=Dynamic+search&utm_source=adwords&utm_medium=ppc&hsa_acc=5741723400&hsa_cam=13137172506&hsa_grp=121860226709&hsa_ad=522231768188&hsa_src=g&hsa_tgt=dsa-19959388920&hsa_kw=&hsa_mt=b&hsa_net=adwords&hsa_ver=3&gclid=Cj0KCQjwtMCKBhDAARIsAG-2Eu_yxzDHGvyrv83EHFolQxzQ3fIHjClRKlpt5JBFe256oxoZWgkc7ekaAkO8EALw_wcB.
0 notes
Text
MAJOR CHALLENGES EMERGING IN THE NETWORK & INFORMATION SECURITY FIELD
The emergence of the internet brought about many innovations, one of them being the ability to share files amongst computers from anywhere in the world. However, despite this revolution, there still remains recurring challenges faced in the network and information security field. It goes to say that for every good invention, accompanying it is a list of negative usability. Most of these challenges are security related, whereby cyber criminals get access to confidential data consequently leading to loss of money or profit of a business. This is a problem for people, organizations and government alike. In this modern era where everything seems to be on the internet, from private photos to credit card details, securing data has never been so paramount. Network security challenges come in various forms like ransomware attacks, cloud attacks, phishing attacks, and so on. It is vital more people are trained on how to properly secure data effectively so these challenges can be minimized.
Very recently, on the 4th of may 2021, Colonial Pipeline, a company based in the United States, lost $4.4 million dollars due to ransomware attack by a cybercriminal named “Darkside”. This type of attack involves hacking into a user’s data and preventing them from accessing it until a ransom amount is paid. Ransomware attacks are on the up, given that companies would non-hesitantly pay a sum to cyber criminals for the retrieval of their sensitive data, it is one of the most common type of attacks. Chris Sedgwick, the director of security operations at Talion, after the attack called for a multifactor authentication on all remote access services which would have guarded against this form of attack.
Cloud services are now easily accessible to individuals which meets personal and professional needs. This service is a storage platform that allows storing of data online. Confidential data is usually stored in the cloud and this puts information at risk to hackers. Back in 2014, iCloud, which is the online storage service provided by Apple Inc, was hacked, which exposed private photos of some top celebrities. If such attack was aimed at an organization and not an individual, it could lead to the collapse of that organization.
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card details. This is the most common challenge in the network and information security sphere. Unlike ransomware, the attacker obtains the user data to be used for personal advantage such as illegal money transfer or online shopping. This is so common because most individuals aren’t well versed in handling confidential data.
In conclusion, more measures should be taken to tighten the network security structures of companies by introducing multifactor authentication which presents different identification verification stages before access can be granted. Also educate individuals on how to properly secure confidential data.
References
· Owen, Malcolm. “‘Celebgate’ ICloud Hack Perpetrator Sentenced to 34 Months in Prison | AppleInsider.” AppleInsider, AppleInsider, 1 Mar. 2019, https://appleinsider.com/articles/19/03/01/celebgate-icloud-hack-perpetrator-sentenced-to-34-months-in-prison.
· Upadhyay, Isha. “Top 10 Challenges of Cyber Security Faced in 2021.” Jigsaw Academy, Jigsaw Academy, 28 Aug. 2020, https://www.jigsawacademy.com/blogs/cyber-security/challenges-of-cyber-security/.
· Winder, Davey. “The Five Most Important Ransomware Attacks of 2021 - Raconteur.” Raconteur, https://www.facebook.com/raconteur.net, 21 Sept. 2021, https://www.raconteur.net/technology/the-five-most-important-ransomware-attacks-of-2021/.
1 note
·
View note