Post 7: Tech Topic
Let’s dive deeper into the topic of Network Security and
its role in the world of Information Technology. In the late '60s, the use of
digital storage started to become more accessible to companies. This digital
storage would hold data that became accessible through a company's mainframe,
allowing any computer or terminal to access the information from within that
building (Avast, 2020, para. 2). The ability to share data was valuable to
companies, so they started putting more data on their network, helping them be
more efficient. At that time, network security was much simpler because the
only people who could access the information were the people inside the
building since that was the limitation of network access at the time. Fast
forward to today, and now it seems like everything and everyone is connected to
the internet all the time. Loads of personal data are stored on our home and
office computers, as well as our smartphones. At the same time, we are more
connected to everything than ever before. That’s a scary combination.
To adequately safeguard our information, we need to have
the proper equipment and knowledge to not get caught in a compromising
situation. Any device can have security holes that arise in the operating
system (OS), so the user must know to keep the OS up to date with the latest
software. These software updates can bring additional features and close known
security holes (Vahid & Lysecky, 2017, Section 8.1 Security basics, para. 5).
Most OS's have a built-in option to check for new updates manually and should
also give an option for automatic updates, so you don’t have to remember to
check regularly.
Some hardware items that help with network security are
firewalls and routers. Firewalls protect the boundaries of an internal network.
By controlling access to the internal network and adding cryptographic
protection to data leaving the network, firewalls create an extra layer of
protection for your sensitive information (Zhang et al., 2007, p.3). Routers help
the ISP communicate with the devices in your network and can also help computers
connect to a printer on the same network. Most routers have Wireless Encryption,
also known as WEP, or Wi-Fi Protected Access, known as WPA. They are both
encryption options that keep your network locked to outsiders (Strickland,
2020, para. 6). Without these and other hardware components, individuals with
malicious intent will have easy access to our private information.
Software plays a role through applications and programs
too. Antivirus software can scan your computer to see if any existing malware
is detected, then works to remove it. Most antivirus software will run
automatic scans at designated intervals, then provide a report or popup message
with the results.
It’s important to keep database management systems up to
date and working efficiently. That’s why they need to be protected. There are thousands,
if not millions, of products that are organized, counted, labeled, searched,
and sold all because of a database management system. A hacker could do a lot
of damage by throwing everything out of order and causing the company a lot of
precious time trying to put the puzzle together again. Meanwhile, they may be
losing sales because of the lack of an inventory system. Sites like Amazon need
to protect their databases for these reasons.
References:
Avast (2020). History and future of network security. https://www.avast.com/business/resources/future-of-network-security
Congzhe Zhang, MengChu Zhou, & Ming Yu. (2007). Ad
hoc network routing and security: A review. International Journal of
Communication Systems, 20(8), 909–925. https://doi-org.proxy-library.ashford.edu/10.1002/dac.840
DIJIANG HUANG, QING CAO, AMIT SINHA, SCHNIEDERJANS, M.
J., BEARD, C., HARN, L., & MEDHI, D. (2006). New Architecture for
Intra-Domain Network Security Issues. Communications of the
ACM, 49(11), 64–72.
https://doi-org.proxy-library.ashford.edu/10.1145/1167838.1167839
Strickland, J. (2020). How to Secure Your Home
Network. HowStuffWorks. https://electronics.howstuffworks.com/how-to-tech/how-to-secure-home-network1.htm
Vahid, F., & Lysecky, S. (2017). INT 100:
Fundamentals of Information Technology & Literacy. Zyante Inc.
(zyBooks.com). https://learn.zybooks.com/zybook/ASHFORDINT100AcademicYear2018/chapter/8/section/1

Comments
Post a Comment