Final Blog Post Network Security

 

Final Blog Post Network Security

            I chose the topic of network security based on the path I would love to pursue because of the curiosity and interest I have developed since I retired from the Marines. Reading through the course textbook chapters: Fundamentals of Information Technology & Literacy home helped me understand rules/guidelines and apply better network security concepts from the simple things I forgot and overlooked. “The user can customize these rules. In addition, some network routers have hardware-based firewalls that block connections that do not initiate within the network (Vahid, F., 2019).” Today, network security is one of the essential topics for every business organization and home PC. Not having the proper protection software, i.e., antivirus, phishing, and spam blockers, can lead to devastation with no recovery. Technology must continuously evolve to keep up with the changing and new demands needed in the workforce. Computer science and technology of the past cannot exist in today’s world, where cyber criminals seek to gain and take command of vital information from organizations and wealthy individuals.  

 

Computer operating systems have had no option but to evolve due to constantly failed security patches used to combat hacking of software application failures. The most common computer operating system Microsoft Windows is currently at its latest Windows 11 OS, while MAC is not far behind with its MACOS 12 Monterey. With the new OS, computer manufacturers like Apple, HP, Lenovo, and Dell look for better implementation of secured hardware from processors and chipsets from leading developers such as Intel and AMD. With a faster performance from an array of chips, Solid State Drive (SSD), and an increasing gigabyte of ram, the software application used as a defense against network intrusion can quickly become an asset and quarantine a threat.

 

            Programming languages like Python are replacing the old fashion way of configuring network devices to aid network security. Command Line Interface (CLI) is fading away with placing languages like Python, thus giving developers better control over multiple devices. Other languages like JavaScript, PHP, and SQL can be used to get steps ahead and fend off intruders while maintaining and retrieving vital data.

 

Network security and application software often share the common goal of protecting data against cybersecurity threats. The network security software industry and companies can specialize in the field have seen vast growth. Customers flocking their sites to purchase, build, and even upgrade their current system protection to prevent vital data from reaching the hands of those who look to exploit them for money or the latest crave bitcoin. Some experts say because everyone makes mistakes, it is essential to find the right network security software to protect their data. “Security and risks in reputation, especially for businesses with sensitive data, have been a concern after regulations of self-isolation pushed people to work at home, and organizations had to adapt their business models to accommodate a remarkable increase of network activities. Many hackers have consistently redirected their activities from attacking businesses toward activities that could reach consumers or employees at their homes through platforms, e.g., Netflix or Zoom (Wang, L., Alexander, C., 2021).”

Network security relates to database and database management because information stored in a database is precious and often a very sensitive commodity to an organization. Suppose any loss or corruption to data. Daily operations would be immediately affected. A poor network security structure can create a “Weak defense system can also be divided by vulnerability, inaccurate identification. External attacks are the main source of database security threats and cause the most serious damage. Further, there are many secondary categories, including spam, malicious traffic, SQL injection, illegal access, malware, DDoS attacks, bypass, and physical attacks (Wang, Y., Xi, J., Cheng, T., 2021).”

References

Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

 

Wang, L., Alexander, C., (2021). Cyber security during the COVID-19 pandemic. AIMS Electronics and Electrical Engineering, 5(2): 146–157. DOI: 10.3934/electreng.2021008. https://www.aimspress.com/aimspress-data/electreng/2021/2/PDF/electroneng-05-02-008.pdf

 

Wang, Y., Xi, J., Cheng, T., (2021). The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning. https://www.scirp.org/journal/paperinformation.aspx?paperid=106429




Comments

What's Happening in Technology

Programming Languages

Network Security