Font Size: a A A

An Examination of the Evolution of Techniques and Technologies Fielded in the Defense of Computer Network

Posted on:2019-11-11Degree:M.SType:Thesis
University:Utica CollegeCandidate:Williams, JessFull Text:PDF
GTID:2448390002471023Subject:Information Technology
Abstract/Summary:
The purpose of this paper is to analyze and elucidate the onset and progression of techniques and technology employed in defending computer networks and systems. In doing so, this body of research fills a gap by providing a comprehensive examination of the current state of computer network defense as well as a retrospective of the same. Additionally, this paper will examine the tactics, techniques, and procedures employed by computer network defenders and compared those tactics and technology to what computer network attackers utilize. The research shows that computer security was not initially a priority at the dawn of the computer age. As time has progressed computer and network security (now referred to as 'Cyber Security') has become a priority mainly due to the persistent onslaught of cyber-attacks, malware, and data breaches targeting networks and systems worldwide. The research draws the following conclusions regarding three gaps facing network defenders: First---computer security education needs to be improved at all levels; Second---security needs to become and remain a priority for all individuals, not just security professionals; Third---there is a dire need for increased collaboration between private companies and government entities.
Keywords/Search Tags:Computer, Techniques, Security
Related items