EFFECTIVENESS OF MODERN TECHNOLOGIES AND PROTECTION METHODS IN ENSURING THE SECURITY OF INFORMATION NETWORKS

Authors

DOI:

https://doi.org/10.63034/esr-643

Keywords:

information networks, cybersecurity, network attacks, IDS/IPS, encryption, Zero Trust, firewall, artificial intelligence, monitoring, protection technologies

Abstract

The increasing complexity of information systems and the rapid development of network infrastructure have made cybersecurity a strategically important issue for modern society. The growth of information exchange in networks, the widespread use of cloud computing, and IoT devices make networks vulnerable to various threats. Therefore, ensuring the security of information networks requires the use of modern technologies, including next-generation firewalls, intrusion detection and prevention systems (IDS/IPS), Zero Trust architecture, encryption algorithms, and AI-based monitoring tools. This article analyzes the fundamental principles of network security, the advantages and limitations of contemporary methods, and their effectiveness in protecting information. The study results highlight the importance of developing a comprehensive approach to securing information networks and emphasize the role of innovative technologies in countering current cyber threats.

References

Stallings, W. Network Security Essentials: Applications and Standards. Pearson, 2020.

Easttom, C. Computer Security Fundamentals. Pearson IT Cybersecurity Series, 2022.

Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2020.

Scarfone, K., Mell, P. Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication, 2012.

Kindervag, J. Zero Trust Architecture. Forrester Research, 2010.

Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, 2017.

Shabtai, A., Elovici, Y., Rokach, L. A Survey of Data Leakage Detection and Prevention Solutions. Springer, 2012.

Chuvakin, A., Schmidt, K., Phillips, C. Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management. Syngress, 2012.

AWS Security Documentation. https://docs.aws.amazon.com

Downloads

Published

2026-02-11

How to Cite

Bekbosynova , B. (2026). EFFECTIVENESS OF MODERN TECHNOLOGIES AND PROTECTION METHODS IN ENSURING THE SECURITY OF INFORMATION NETWORKS. Eurasian Science Review An International Peer-Reviewed Multidisciplinary Journal, 5(1), 213–220. https://doi.org/10.63034/esr-643