A Detailed Review of Contemporary Cyber/Network Security Approaches and Emerging Challenges

Authors

  • Michael Oladipo Akinsanya

    Wichita State University, Kansas State, USA.
    Author
  • Oluwafemi Clement Adeusi

    Staffordshire University, UK.
    Author
  • Kazeem Bamidele Ajanaku

    College of Engineering and Technology, Ladoke Akintola University of Science and Technology, Ogbomosho, Nigeria
    Author

Keywords:

AI, Cybersecurity, attacks, defense mechanism and trend.

Abstract

This ability to use more digital technologies has exposed information systems to malicious actions and put their confidentiality, integrity, and availability at risk. The increasing difficulty in protecting critical assets against cybercriminals as cybercriminals are constantly changing tactics is an issue that organizations, individuals and governments are increasingly struggling with. What is bad about these threats is not necessarily their sophistication but the fact that conventional defense mechanisms do not have much sustainable capacity to combat these threats. To combat this ever-increasing threat, effective knowledge base must be established regarding the current state of security, and the changes that the attacks undergo. The goal of this research is to take an organized look at the existing environment of threats in the realm of cyberspace, the measures put in place in order to address these threats, and the gaps that require improvements through research. The review collates available literature findings with a view to identifying key challenges such as advanced persistent threats, zero-day exploits, and also risks posed by the increased use of emerging digital infrastructures. Next, it tries to analyze how innovative technologies. Artificial Intelligence (AI) and Machine Learning (ML) can be used in automating detection and response systems to improve resilience to dynamic attack. The findings not only describe the current situation in the sphere of cybersecurity but also outline its future trends pointing to the necessity of the perpetual innovation, collaboration of various stakeholders and versatile approaches to the threat environment that is changing very fast.

 

Author Biographies

  • Oluwafemi Clement Adeusi, Staffordshire University, UK.

     

    Department of Computer Science Network and Security, 

     

  • Kazeem Bamidele Ajanaku, College of Engineering and Technology, Ladoke Akintola University of Science and Technology, Ogbomosho, Nigeria

     

    Department of Mechanical Engineering, 

Downloads

Published

2022-12-30

Similar Articles

1-10 of 198

You may also start an advanced similarity search for this article.