International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 176

Tanzania | Computer Science Engineering | Volume 8 Issue 2, February 2019 | Pages: 834 - 841


Network Security: A Brief Overview of Evolving Strategies and Challenges

Francis Aidan Ruambo

Abstract: Network Security strategies evolves parallel with the advancement and development of computer systems and services. The ubiquity of ICT devices and services offers undeniable efficiency in executing our daily routine activities. Challenges in the aspects of security and continuous availability of the ICT resources and services, trigger the evolution of network security strategies. In this review paper, a brief overview of evolving strategies adopted within the dynamic paradigm of network security is highlighted and challenges are reviewed. Additionally, interesting areas for future research in securing the computer network ecosystem are suggested. The review finds that, as long as computer systems and services are dynamically evolving, then the network security strategies will also continue to be an evolving and volatile paradigm. In order to enhance network security, there is a need of incorporating new innovative strategies whilst embracing network security best practices and principles to mitigate appropriately the evolving threats within the computer network ecosystem.

Keywords: Network Security, Computer Networks, Security Management, Internet of Things



Citation copied to Clipboard!

Rate this Article

5

Characters: 0

Received Comments

Marcus F. Clancy Rating: 5/10 😐
2024-10-29
An excellent review work on the perspective of evolving security threats and landscape and their mitigation approaches while highlighting the future opportunities
Floyd C. Bayangata Rating: 10/10 😊
2025-05-22
Interesting Narrative Review Article Maintaining its Relevance in Realm of Cybersecurity and Evolving with the Cybersecurity Paradigms.

Rating submitted successfully!


Top