Post 7: Tech Topic




Let’s dive deeper into the topic of Network Security and its role in the world of Information Technology. In the late '60s, the use of digital storage started to become more accessible to companies. This digital storage would hold data that became accessible through a company's mainframe, allowing any computer or terminal to access the information from within that building (Avast, 2020, para. 2). The ability to share data was valuable to companies, so they started putting more data on their network, helping them be more efficient. At that time, network security was much simpler because the only people who could access the information were the people inside the building since that was the limitation of network access at the time. Fast forward to today, and now it seems like everything and everyone is connected to the internet all the time. Loads of personal data are stored on our home and office computers, as well as our smartphones. At the same time, we are more connected to everything than ever before. That’s a scary combination.

To adequately safeguard our information, we need to have the proper equipment and knowledge to not get caught in a compromising situation. Any device can have security holes that arise in the operating system (OS), so the user must know to keep the OS up to date with the latest software. These software updates can bring additional features and close known security holes (Vahid & Lysecky, 2017, Section 8.1 Security basics, para. 5). Most OS's have a built-in option to check for new updates manually and should also give an option for automatic updates, so you don’t have to remember to check regularly.

Some hardware items that help with network security are firewalls and routers. Firewalls protect the boundaries of an internal network. By controlling access to the internal network and adding cryptographic protection to data leaving the network, firewalls create an extra layer of protection for your sensitive information (Zhang et al., 2007, p.3). Routers help the ISP communicate with the devices in your network and can also help computers connect to a printer on the same network. Most routers have Wireless Encryption, also known as WEP, or Wi-Fi Protected Access, known as WPA. They are both encryption options that keep your network locked to outsiders (Strickland, 2020, para. 6). Without these and other hardware components, individuals with malicious intent will have easy access to our private information.

Software plays a role through applications and programs too. Antivirus software can scan your computer to see if any existing malware is detected, then works to remove it. Most antivirus software will run automatic scans at designated intervals, then provide a report or popup message with the results.

It’s important to keep database management systems up to date and working efficiently. That’s why they need to be protected. There are thousands, if not millions, of products that are organized, counted, labeled, searched, and sold all because of a database management system. A hacker could do a lot of damage by throwing everything out of order and causing the company a lot of precious time trying to put the puzzle together again. Meanwhile, they may be losing sales because of the lack of an inventory system. Sites like Amazon need to protect their databases for these reasons.

When it comes to network architecture and management, it's important to set it up to serve the end user's needs. But, securing the router infrastructure is vital because the routers can be compromised. According to Huang et al. (2006), “… Reports indicate routers are being used by intruders as platforms for scanning activity. … Routers make attractive targets for intruders…routers are often less protected by security policy and monitoring technology…”. If there’s a point that gets overlooked, someone will find the vulnerability and exploit it. This evolving race to keep security intact is fascinating to me, and I’ll surely be diving deeper into this subject as time goes on. I want to be confident in protecting my home and my future clients and continue to grow with technology.


References: 

Avast (2020). History and future of network security. https://www.avast.com/business/resources/future-of-network-security

Congzhe Zhang, MengChu Zhou, & Ming Yu. (2007). Ad hoc network routing and security: A review. International Journal of Communication Systems20(8), 909–925. https://doi-org.proxy-library.ashford.edu/10.1002/dac.840

DIJIANG HUANG, QING CAO, AMIT SINHA, SCHNIEDERJANS, M. J., BEARD, C., HARN, L., & MEDHI, D. (2006). New Architecture for Intra-Domain Network Security Issues. Communications of the ACM, 49(11), 64–72. https://doi-org.proxy-library.ashford.edu/10.1145/1167838.1167839

Strickland, J. (2020). How to Secure Your Home Network. HowStuffWorks. https://electronics.howstuffworks.com/how-to-tech/how-to-secure-home-network1.htm

Vahid, F., & Lysecky, S. (2017). INT 100: Fundamentals of Information Technology & Literacy. Zyante Inc. (zyBooks.com). https://learn.zybooks.com/zybook/ASHFORDINT100AcademicYear2018/chapter/8/section/1

Comments