The Future of Cybersecurity

95 views 8 pages ~ 2102 words
Get a Custom Essay Writer Just For You!

Experts in this subject field are ready to write an original essay following your instructions to the dot!

Hire a Writer

Cybersecurity is a major element and field of focus for all technology enthusiasts and organization stakeholders aiming at controlling and managing the security of information systems and critical entities. Moreover, increasing cyber threats and cyber-attacks have resulted in all stakeholders finding techniques for improving cybersecurity. Therefore, this study aimed at studying the main issues which influence the evolution of cybersecurity and determine the future of cybersecurity. According to the study findings, major issues noted include the advancements in artificial intelligence and machine learning which offers potential opportunities for deep learning and assess the anomalies within the IT systems. However, also possibilities of weaponizing AI was identified to be a major influence from the negative side. The aim of fixing the current cybersecurity architectures, increased number of emerging technologies were also major influences to the evolution of the cybersecurity field. The future of cybersecurity is noted to rely on the current practices and mechanisms used to counter the threats while protecting emerging technologies.

Future of Cybersecurity


The current climate of cyberspace has witnessed numerous attacks especially in the year 2017 where the highest number of data breaches involving big companies such as Equifax, Target reported exposure of millions of sensitive data to hackers. Hackers are on the rise with improvement in skills and utilizing more sophisticated software tools to exploit multiple information systems with vulnerable content. The increasing in cyber-attack is due to the motivation to exploit and steal information which can be sold in the dark web particularly medical information of the individual or the hacking is funded by a nation targeting exploitation of another country’s critical systems such as the US power grid by Russians (Shackelford et al., 2017). Increased vulnerabilities caused by the use of weakly tested software applications, infected systems, outdated software or lack of adequate incident response plan to document all countermeasures for any attacks enables hackers to successfully exploit the information systems. On the other hand, cybersecurity is being improved with numerous and regular adjustments which are aimed at carping the challenges raised by the various cyber-attacks. Moreover, various technologies such as Internet of Things (IoT) devices, cloud computing, e-commerce businesses, wide area networks are continuously expanding and all of them rely on the innovation of proper cybersecurity preparation to ensure that they are protected. Hence, the future of cybersecurity is becoming more complicated and requires technology enthusiasts to develop a new mechanism for each technology. The primary aim of this essay is to assess the current and future state of cybersecurity evolution.

Research question

What is the main influence of the constant evolution of cybersecurity?

The emergence of new technologies

Cybersecurity deals with the development of mechanisms, skills, and techniques used to counter attacks as well as mitigating potential cyber threats. Due to the uncontrolled field of technology, numerous innovations are deployed into the world hence, the current cybersecurity architecture could not be suitable for protection of tomorrow or future technology applications. Delgado (2018) avers that as the white hat hackers find new techniques of countering cyber threats such as the encryption tools for malicious behavior, there is also an immediate development of yet another technique employed for compromising IT systems. Moreover, the increased automation of virtual processed and digital connectivity in the business world has resulted in the development of agility thus raising significantly high levels of threats and cybersecurity risks. Therefore, cybersecurity needs to utilize emerging technologies to zip the gaps and threats aiming at the compromise of information systems.

Delgado (2018) proposed three techniques which can be used for advancing cybersecurity. Firstly, hardware authentication is a more secure cybersecurity mechanism employed to replace usernames and passwords which have been considered weak and can be easily broken by hackers through techniques such as brute force, use of password cracking software or email-phishing approaches. Hardware authentication involving technologies such as Core vPro processors for sixth generation computers and IoT can be considered more effective. Secondly, Cloud technology which has provided potential wide storage space for information from governments and numerous enterprises. Technology tools such as virtualized systems, virtualized firewalls, and virtualized intrusion detection and prevention systems will now be effectively integrated into cloud technology to protect vast information stored in the cloud. Finally, deep learning technologies involving artificial intelligence and machine learning. Deep learning technologies are implemented as a security mechanism to detect any anomalous activities within the information systems for the network (Delgado, 2018). Moreover, machine learning and AI systems are fed with appropriate data about potential cybersecurity threats hence they can effectively make decisions on which approach to use in preventing the possible attacks.

On the other hand, the advancements in Artificial intelligence raises serious threat on the current cybersecurity architecture which makes technology enthusiast to not only leverage AI as a way of protecting information systems but also, other finding new techniques which can counter threats launched by AI technologies. According to Buttice (2018), AI is the most influential technology in the modern digital world and every software developer is aiming at incrementing functions utilizing AI for various purposes such as gathering business intelligence. However, it is noted that AI is the most potent weapon when used by the wrong hands since it can break any cyber-defense mechanism established to protect critical content. For instance, hackers could utilize smart malware tools equipped with the newest algorithms and IoT botnets which are less detectable and launch attacks which has the potential of exploiting more systems than the regular cyber-attacks.  According to Lych (2017), AI area said to be the most complicated cyber attacks that will be effectively managed by humans.

Moreover, it was predicted that 2018 will be the year of autonomous weaponization of AI and multiple machines to machine attacks will be witnessed (Lych, 2017). When AI attacks are launched within a victim network environment, the specialized algorithms stay for a longer period where it studies and analyzes the network activity on a daily basis including the network traffic flow. This enables it to slowly weaken the vulnerabilities found within the network and the entire system while installing malware that will weaken the security mechanisms developed against it hence, the hackers will obtain appropriate opportunities for exploiting the systems. Hackers will develop a mechanism of controlling the entire network and access to its resources through distributed denial of service attacks. Therefore, this influences the majority of cybersecurity professionals to continuously develop innovative solutions and policies that help in analyzing the vulnerabilities of cybersecurity systems, generate reports and develop a mechanism to solve the problems in early stages. In this instances, the use of AI from the end of the victim’s network and systems using technologies such as AI assistants have the potential of countering possible attacks emerging from the weaponization of this technology.

Need to address vulnerabilities of the current cybersecurity architecture

The numerous vulnerabilities which are existing in different systems that give rise to data breaches are a major challenge in the cybersecurity architecture. Changes within the systems, new security patches, and updates need to be installed under a controlled and secure environment. Additionally, most workers in several enterprises are introduced to the usage of computers and computer system regardless of their knowledge in operating with computers systems and the security architecture behind. In this instances, some workers are found to a vulnerability point where hackers send enticing emails as authorized people and they request for sensitive information such as credentials of accessing internal organization resources. This results in rampant data breaches beyond control. Some workers like using organization computers to download the application from untrusted sites such as pirating platforms to get software or films they want where they download these materials with malware and keyloggers used in attacking the organization and its systems. Therefore, all these vulnerabilities need to be addressed effectively by the current cybersecurity architecture with recommendations on security policies, installation of software, and sharing of any information through the emails.

On the other hand, Coles-Kemp, Ashenden, and O’Hara (2018) aver that there are some main issues which have not been addressed in the current cybersecurity architecture. First, the consensus in determining the specific users whose security is being handled. Second, there is a lack of evidence of the equality of the security mechanisms being employed to control security behavior. Third, there is no two-way legibility. Hence, it is recommended that these absences must be addressed to ensure the foundations of collaboration and trust are established and the aims of cybersecurity are effectively achieved (Coles-Kemp, Ashenden, & O’Hara, 2018). Cybersecurity, in this case, is not focused on protecting only corporate and the government but also the public digital systems and information users who have little knowledge from the protection of devices such as smartphone and laptops. Most of the public is vulnerable to attacks launched from malware infections, physical theft, and compromise of the operating system of the devices that they regularly used to connect to any network whether secured or public.

Research in the field of cybersecurity is a major influence for improvement of cybersecurity techniques in future technologies. Most of the researchers are regularly proposing new directives, tools, and methodologies that should be employed by IT professionals to address the issues of cybersecurity. For instance, Stevens (2018) investigated the Global cybersecurity which proposes new theories and models applicable to future cybersecurity. Examples of potential approaches which future researchers should use in exploring the subject of cybersecurity include participant observation, science and technology studies, critical international relations theory, quantitative political science, and other social sciences. Due to the complexity of the cybersecurity field, it is recommended to investigate the subject from every field to ensure that future frameworks are accommodative and could be applied to secure systems at any instance of the cybersecurity evolution.


The future of cybersecurity actually relies on the current mechanism and techniques employed in securing current and future technologies. Moreover, due to the uncontrolled technology innovations, multiple applications and technologies are being deployed on the internet and they are exposed to multiple cyber-attacks hence, this calls for advancements in cybersecurity to address vulnerabilities and secure information systems and potential victims. All the factors identified in this essay indicates the main issues influencing cybersecurity evolution. 


Buttice, C. (2018, August 15) How AI Advancements Are Affecting Security, Cybersecurity and       Hacking. Retrieved from     affecting-security-cybersecurity-and-hacking/2/33395

Coles-Kemp, L., Ashenden, D. M., & O'Hara, K. (2018). Why Should I?: Cybersecurity, the       security of the state and the insecurity of the citizen. Politics & Governance, 6(2), 41-48.

Delgado, R. (2018, March 25). 3 Emerging innovations in Technology that Will Impact Cyber Security. Retrieved from   technology-cyber-security/

Lych, M. (2017). AI cyberattacks will be almost impossible for humans to stop. WIRED.           Retrieved from

Shackelford, S. J., Sulmeyer, M., Deckard, A. N. C., Buchanan, B., & Micic, B. (2017). From   Russia with Love: Understanding the Russian Cyber Threat to US Critical Infrastructure and What to Do about It. Neb. L. Rev., 96, 320.

Stevens, T. (2018). Global Cybersecurity: New Directions in Theory and Methods. Politics and             Governance, 6(2), 1-4.


Annotated Bibliography

Lych, M. (2017). AI cyberattacks will be almost impossible for humans to stop. WIRED.          Retrieved from

This articles talks about how artificial intelligence will be applied by hackers to exploit multiple information systems using complicated mechanisms which cannot be managed by humans. The fact that AI is used for automating services, when it lands on band hands, it is weaponized and becomes dangerous to control or detect. The source is credible since it is posted as one of the articles in the WIRED magazine. The WIRED website is one of the best technology and science research platforms in the UK and its contents are updated with the modern technology improvements. The article is useful for my research since it explains the impact of AI on cybersecurity evolution.

Shackelford, S. J., Sulmeyer, M., Deckard, A. N. C., Buchanan, B., & Micic, B. (2017).            From Russia with Love: Understanding the Russian Cyber Threat to US Critical            Infrastructure and What to Do about It. Neb. L. Rev., 96, 320.

The researchers of this paper aimed at understanding the background of the cyber threats launched by Russians on the US critical infrastructure. Moreover, it elaborates the need for current cybersecurity architecture to be improved to address current critical systems vulnerabilities. This paper is credible since it is published in google scholar as one of the peer reviewed articles and the researchers are top leaders of research working in reputable companies and universities. This paper is vital for my study since it explains the existing vulnerabilities that foster the need for cybersecurity evolution to counter all the threats affecting critical infrastructure.

September 04, 2023


Subject area:

Future Security

Number of pages


Number of words




Writer #



Expertise Security
Verified writer

Susan did a phenomenal job on my Philosophy paper based on a tricky case study. My thesis was the best in my class and I got praised for my assignment. Thank you so much for your amazing service and dedication!

Hire Writer

This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Eliminate the stress of Research and Writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro