Final Blog Post Network Security
Final Blog Post Network Security
I chose the topic of network security based on the path I
would love to pursue because of the curiosity and interest I have developed
since I retired from the Marines. Reading through the course textbook chapters:
Fundamentals of Information Technology & Literacy home helped me understand
rules/guidelines and apply better network security concepts from the simple
things I forgot and overlooked. “The user can customize these rules. In
addition, some network routers have hardware-based firewalls that block
connections that do not initiate within the network (Vahid, F., 2019).” Today,
network security is one of the essential topics for every business organization
and home PC. Not having the proper protection software, i.e., antivirus,
phishing, and spam blockers, can lead to devastation with no recovery.
Technology must continuously evolve to keep up with the changing and new
demands needed in the workforce. Computer science and technology of the past
cannot exist in today’s world, where cyber criminals seek to gain and take
command of vital information from organizations and wealthy individuals.
Computer
operating systems have had no option but to evolve due to constantly failed
security patches used to combat hacking of software application failures. The
most common computer operating system Microsoft Windows is currently at its
latest Windows 11 OS, while MAC is not far behind with its MACOS 12 Monterey.
With the new OS, computer manufacturers like Apple, HP, Lenovo, and Dell look
for better implementation of secured hardware from processors and chipsets from
leading developers such as Intel and AMD. With a faster performance from an
array of chips, Solid State Drive (SSD), and an increasing gigabyte of ram, the
software application used as a defense against network intrusion can quickly
become an asset and quarantine a threat.
Programming languages like Python are replacing the old
fashion way of configuring network devices to aid network security. Command
Line Interface (CLI) is fading away with placing languages like Python, thus
giving developers better control over multiple devices. Other languages like
JavaScript, PHP, and SQL can be used to get steps ahead and fend off intruders
while maintaining and retrieving vital data.
Network
security and application software often share the common goal of protecting
data against cybersecurity threats. The network security software industry and
companies can specialize in the field have seen vast growth. Customers flocking
their sites to purchase, build, and even upgrade their current system
protection to prevent vital data from reaching the hands of those who look to
exploit them for money or the latest crave bitcoin. Some experts say because
everyone makes mistakes, it is essential to find the right network security
software to protect their data. “Security and risks in reputation, especially
for businesses with sensitive data, have been a concern after regulations of
self-isolation pushed people to work at home, and organizations had to adapt
their business models to accommodate a remarkable increase of network
activities. Many hackers have consistently redirected their activities from
attacking businesses toward activities that could reach consumers or employees
at their homes through platforms, e.g., Netflix or Zoom (Wang, L., Alexander,
C., 2021).”
Network
security relates to database and database management because information stored
in a database is precious and often a very sensitive commodity to an organization.
Suppose any loss or corruption to data. Daily operations would be immediately
affected. A poor network security structure can create a “Weak defense system
can also be divided by vulnerability, inaccurate identification. External
attacks are the main source of database security threats and cause the most
serious damage. Further, there are many secondary categories, including spam,
malicious traffic, SQL injection, illegal access, malware, DDoS attacks, bypass,
and physical attacks (Wang, Y., Xi, J., Cheng, T., 2021).”
References
Vahid, F., & Lysecky, S. (2019). Computing
technology for all.
zyBooks.
Wang, L., Alexander, C., (2021). Cyber security during the
COVID-19 pandemic. AIMS Electronics and Electrical Engineering, 5(2): 146–157.
DOI: 10.3934/electreng.2021008. https://www.aimspress.com/aimspress-data/electreng/2021/2/PDF/electroneng-05-02-008.pdf
Wang, Y., Xi, J., Cheng, T., (2021). The Overview of
Database Security Threats’ Solutions: Traditional and Machine Learning. https://www.scirp.org/journal/paperinformation.aspx?paperid=106429

Comments
Post a Comment