Pages

Saturday, June 4, 2022

Tech Topic Connection


I chose the topic of network security based upon the path of my career thus far and the steps that I have taken both at home and work to prevent viral attacks from taking place under my watch. Reading through the course textbook zyBooks: Fundamentals of Information Technology & Literacy home, helped me gain more understanding about rules/guidelines and how to apply better network security concepts from the simple things I forgot and completely overlooked. “These rules can be customized by the user. In addition, some network routers have hardware-based firewalls that block connections that do not initiate within the network (Vahid, F., 2019).” Today, network security is one of the most important topics that for every business organization and home PC. Not having the right protection software i.e., antivirus, phishing and spam blockers can lead to devastation with no recovery in sight. Technology must continuously evolve to keep up with the changing and new demands needed in the workforce. Computers science and technology of past cannot exist in today’s world in which cyber criminals looks to gain and take command of vital information from organizations and/or wealthy individuals.

Computer operating systems over the years too had no other option but to evolve due constant failed security patches as well used to combat hacking of software application failures. The most common computer operating system Microsoft Windows is currently at its latest Windows 11 OS while MAC is not far behind with its MACOS 12 Monterey. With the new OS, computer manufactures like Apple, HP, Lenovo and Dell looks for better implementation of secured hardware from processor and chip set from leading developers such as Intel and AMD. With a faster performance from an array of chips along with Solid State Drive (SSD) and increasing gigabyte of ram, the software application used in as a defense against network intrusion can quickly asset and quarantine a threat.

Programming languages like Python is replacing the old fashion way of configuring network devices used to aid network security. The use of Command Line Interface (CLI) is fading away and with placing languages like Python thus giving developers better control over multiple devices. Other languages like JavaScript, PHP and SQL can be used to get steps ahead, fend of intruders while maintaining and retrieving vital data.

The common goal of protecting data against cybersecurity threats is often shared by both network security and application software. The network security software industry and companies who specialize in the field has seen a vast growth of old and new customers flocking their sites to purchase, build and event upgrade their current system protection to prevent vital data from reaching the hands of those who look to exploit them for money or the latest crave bitcoin. Some experts say because everyone makes mistakes, it is important to find the right network security software to protect their data. “Security and risks in reputation, especially for businesses with sensitive data which have been a concern after regulations of self-isolation pushed people to work at home and organizations had to adapt their business models to accommodate a remarkable increase of network activities. Many hackers have consistently redirected their activities from attacking business toward activities that could reach consumers or employees at their homes through platforms, e.g., Netflix or Zoom (Wang, L., Alexander, C., 2021).”

Network security relates to database and database management because information stored in a database is very valuable and at many time, a very sensitive commodity to an organization and if any loss or corruption to data, daily operation would be immediately affected. A poor network security structure can create a “Weak defense system can also be divided by vulnerability, inaccurate identification. The external attacks are the main source of database security threats, and they cause the most serious damage. Further, there are many secondary categories, including spam, malicious traffic, SQL injection, illegal access, malware, DDoS attacks, bypass and physical attacks (Wang, Y., Xi, J., Cheng, T., 2021).”


 

Reference:

Vahid, F., & Lysecky, S., (2019). Computing technology for all. https://learn.zybooks.com/zybook/TEC101:_Fundamentals_of_Information_Technology_&_Literacy_(TED2219A)/chapter/6/section/8

Wang, L., Alexander, C., (2021). Cyber security during the COVID-19 pandemic. AIMS Electronics and Electrical Engineering, 5(2): 146–157. DOI: 10.3934/electreng.2021008. https://www.aimspress.com/aimspress-data/electreng/2021/2/PDF/electroneng-05-02-008.pdf

Wang, Y., Xi, J., Cheng, T., (2021). The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning. https://www.scirp.org/journal/paperinformation.aspx?paperid=106429


 

No comments:

Post a Comment