close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

The Future of Cyber Security: What We Can Expect

downloadDownload printPrint

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

Get custom essay

121 writers online

blank-ico
Download PDF

Battles are moving away from the use of guns and tanks, rather to the use of weaponized cyberattacks to shut down a whole city. A recent example is the Ukrainian cyberattack in 2018 which goes to show how critical cyber warfare is in the contemporary space. Unfortunately, cyber security keeps on being a very reactive activity in the sense that, we have remained in the cat and mouse loop- always proffering quick fix to an already successful attack. Compared with the exponential growth use of cyber threats over the years. Cyber threats poses a great challenge in the nearest future as it is growing side by side with the explosion in the use of internet and poses a question of how ready Tech world is to contain these threats.

With the explosive growth of the internet and the foreseen increase in the use of Internet of Things to over 30 billion as at year 2020 as can be seen in fig 1. 2, a gigantic stack of data would be gathered. The implication is that: The most resilient form of security has to be gotten for the big data.

Indeed, the world is now more aware that cyber threats are genuine and imminent, counter measures are being set up which look to explore the abundant cybersecurity solutions. IT has begun to take the war of security back to our advantage with the so many new innovations such as block chain, which will now be the foundational pieces of upcoming e-government, smart cities, smart IoTs and all other activities carried out in cyber security. Now the community is taking deliberate steps to bring cybersecurity to the forefront of business and all things in the internet space.

Taking all the cyberattacks into consideration, cybersecurity defense systems (CDS) or security information and events management systems (SIEM) will need to become more sophisticated in order to cope with massive data traffic.

The incorporation of artificial intelligence and very fast computing power, into the SIEM systems, analysis of copious amount of data and trends will be easily done in a matter of seconds. Interconnection of SIEM systems of various networks, such that any confirmed breach is sent out to other networks and fixes can be quickly made. Finally, a step in that direction would be to familiarise the old guard with the new cybersecurity standard and train the new guard to comply with the standard.

The implementation of these features would see the SIEM systems smarter, more reliable and scalable. These new systems will have features enabled that will analyse data, identify vulnerabilities, mitigate threats and possibly curb threats all at the same time updating itself and sharing the information with other SIEM systems.

On a personal level, individuals would want to automate parts of our everyday life; this would require IoT connected devices and some virtual assistance using AI. On a national level, governments and large organizations will develop stronger cyber technologies for their network’s security. This baby industry will be one of the largest employer for the next 5 to 10 years, as skills are needed to put these many ideas together to form a formidable and resilient internet void of threats.

The nearest future will definitely deliver a system that can cope or adapt to any change or arising problems without collapsing despite.

Conclusion

The possibility that an information system or asset’s weakness can be exploited by a threat has exponentially moved from one percent to a thousand percent. Unfortunately, a network is always vulnerable, thus, no information or asset is safe.

There are always a new threats coming up after another and in a matter of time fixes are built to protect the system from them. This had been the trend of things for a while, until recently, after several series of serious weaponized cyberattacks such as Petya, Notpetya, Wannacry, huge data breaches, occurring in Atlanta, Ukraine, Russia, and even top notch companies like Yahoo, Facebook, to mention a few, the need to be proactive in securing data has become a very critical part of production for both the present and future.

With this awaken, many innovations have been made such as Blockchain, SIEM, AI or Anomaly IDS/IPS and thousand more will still be built to enhance the present. I t is believed that in the future, the internet will be clean and rid of all threats.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

experts 450+ experts on 30 subjects ready to help you just now

delivery Starting from 3 hours delivery

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

The Future of Cyber Security: What We Can Expect. (2020, April 30). GradesFixer. Retrieved August 15, 2022, from https://gradesfixer.com/free-essay-examples/the-future-of-cyber-security/
“The Future of Cyber Security: What We Can Expect.” GradesFixer, 30 Apr. 2020, gradesfixer.com/free-essay-examples/the-future-of-cyber-security/
The Future of Cyber Security: What We Can Expect. [online]. Available at: <https://gradesfixer.com/free-essay-examples/the-future-of-cyber-security/> [Accessed 15 Aug. 2022].
The Future of Cyber Security: What We Can Expect [Internet]. GradesFixer. 2020 Apr 30 [cited 2022 Aug 15]. Available from: https://gradesfixer.com/free-essay-examples/the-future-of-cyber-security/
copy to clipboard
close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Don't use plagiarized sources. Get your custom essay. Get custom paper
    exit-popup-close

    Haven't found the right essay?

    Get an expert to write you the one you need!

    exit-popup-print

    Professional writers and researchers

    exit-popup-quotes

    Sources and citation are provided

    exit-popup-clock

    3 hour delivery

    exit-popup-persone