EFFECTIVENESS OF MODERN TECHNOLOGIES AND PROTECTION METHODS IN ENSURING THE SECURITY OF INFORMATION NETWORKS
DOI:
https://doi.org/10.63034/esr-643Keywords:
information networks, cybersecurity, network attacks, IDS/IPS, encryption, Zero Trust, firewall, artificial intelligence, monitoring, protection technologiesAbstract
The increasing complexity of information systems and the rapid development of network infrastructure have made cybersecurity a strategically important issue for modern society. The growth of information exchange in networks, the widespread use of cloud computing, and IoT devices make networks vulnerable to various threats. Therefore, ensuring the security of information networks requires the use of modern technologies, including next-generation firewalls, intrusion detection and prevention systems (IDS/IPS), Zero Trust architecture, encryption algorithms, and AI-based monitoring tools. This article analyzes the fundamental principles of network security, the advantages and limitations of contemporary methods, and their effectiveness in protecting information. The study results highlight the importance of developing a comprehensive approach to securing information networks and emphasize the role of innovative technologies in countering current cyber threats.
References
Stallings, W. Network Security Essentials: Applications and Standards. Pearson, 2020.
Easttom, C. Computer Security Fundamentals. Pearson IT Cybersecurity Series, 2022.
Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2020.
Scarfone, K., Mell, P. Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication, 2012.
Kindervag, J. Zero Trust Architecture. Forrester Research, 2010.
Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, 2017.
Shabtai, A., Elovici, Y., Rokach, L. A Survey of Data Leakage Detection and Prevention Solutions. Springer, 2012.
Chuvakin, A., Schmidt, K., Phillips, C. Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management. Syngress, 2012.
AWS Security Documentation. https://docs.aws.amazon.com
Downloads
Published
How to Cite
Issue
Section
Categories
License
Copyright (c) 2026 Bekbosynova Bayan Nurmakhanovna

This work is licensed under a Creative Commons Attribution 4.0 International License.


