SinaNajafi1

GBAC

View the Project on GitHub

Security Systems Nowadays

Hello people, this blog is about “security” in information field and diverse security systems.

Security by its own definition is the state of being free from danger or threat. It seems this concept is being forgotten among people over the time and is becoming like a normal stereotype. This concept has integrated with technology overtime and today it is a complex network around the world in different fields.

Since the beginning of the humanity, people were looking for security to establish a peaceful life within their country, city and their home. Of course, looking for security has led to massive wars between nations throughout history.

SS-KH_security-camera-pros-and-cons-HRO ancient-armor-black-and-white-chivalry-208674

From ancient Egyptian’s security guards to Artificial intelligence (AI) and machine learning (ML):

We can go back in time to see early examples in the Ancient Egyptian Pharaohs who hired private security guards for personal protection. Also, Thomas Jefferson in 1795 created the Jefferson disk or wheel cypher, which was a secure method to encode and decode messages. Today, Artificial intelligence and machine learning have enabled security systems to learn and adapt to changing threats. Security technology helps mitigate risk by preventing unauthorized access, identifying potential incidents, allowing fast responses, deterring criminal behavior and capturing crucial evidence in the event that a breach occurs.

<img src=https://github.com/23W-GBAC/SinaNajafi1/assets/148863702/6c5382e9-5b99-4135-8bc8-da572fa1af5f >

Now, here you can see some of the most advanced security systems, which, is being used widely around the world. These advanced security systems contribute to a multi-layered defense strategy, addressing various aspects of modern cyber security challenges:

1. Biometric Access Control:

This is a valid authentication method and it is mostly used in embassies. For example: Biometric Photo and Biometric Fingerprint.

biometric

2. AI-Powered Threat Detection:

AI-Powered Threat Detection is AI is utilized in various ways to detect and prevent cyber threats.

3. Blockchain Security:

Zero trust (ZT) is the term for an evolving set of cyber security paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources. Zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows.

hacking-3112539_1280

5. Endpoint Detection and Response (EDR):

When it identifies a threat, it alerts your team so they can triage, investigate, and rectify the incident before it has the chance to become a full-blown breach.

6. Security Orchestration, Automation, and Response (SOAR):

As we know improvement in automation equals to progress in efficiency. Automation can also applied in security systems.

7. Cloud Security Posture Management (CSPM):

In cloud environments- like VMware horizon- it detects and prevents the misconfigurations and threats that lead to sensitive data breaches and compliance violations.

8. Threat Intelligence Platforms:

Some Threat Intelligence Platforms are:

-IBM X-Force Exchange: Provides threat intelligence sharing and collaboration and provides a database of threat indicators and vulnerabilities.

-Anomali ThreatStream: Offers orchestration and automation for threat response.

-Cisco Talos Intelligence: Gives threat intelligence for Cisco security products. Also, offers updates on the latest threat.

9. Network Traffic Analysis (NTA):

Collecting a real-time and historical record of what’s happening on your network.

10. Quantum-Safe Cryptography:

Quantum-safe cryptography refers to efforts to identify algorithms that are resistant to attacks by both classical and quantum computers, to keep information assets secure even after a large-scale quantum computer has been built.

Nowadays, you can see how security systems are growing and this progress is being more and more complex and widespread overtime. Obviously, this is because we live in information age, as a result, the need for security in information is compulsory.


Sources: Google Scholar, vodafone.com, avigilon.com, paloaltonetworks.com, rapid7.com, etsi.org, ChatGP, Wikipedia, tracktik.com, grainger.com, securepointng.com, msinfokom.com, blogs.adb.org, matrixcomsec.com

Integrated-Security-Systems-Blog-Image