Network Secuity
In the realm of information technology, security is paramount, with network security serving as an integral component. The foundation of information technology is designed to thwart the inadvertent disclosure of sensitive information. Lacking a fundamental understanding of information technology can leave one susceptible to security breaches, as indicated in the text: "A security hole, or vulnerability, is an aspect of a computer that can be used to breach security" (Vahid, F., & Lysecky, S., 2019). Armed with this foundational knowledge, individuals can play a crucial role in preventing unauthorized access to personal or internal company information.
“Network security started around 1950, and the topic began as soon as people started realizing that there was intrinsic value in data” (Jayaraman, 2023). It has evolved with the development of computers. In the late 1960s and early 1970s, online storage became a reality, making network security even more crucial.
Many major components have functions that are intertwined with network security. Biometric access has undergone significant changes, from cellphones being able to read fingerprints to unlock the phone screen to now being able to recognize facial features for access. Another component that has changed to help against cyber-attacks is routers. Routers come equipped with ACLs (access control lists) that help configure and filter traffic to enhance security by identifying and blocking potential attacks. As mentioned, “An IP packet entering the network is checked against the ACEs. If it matches the criteria, the packet is allowed access. If not, it's blocked” (Jayaraman, 2023), illustrating how routers can keep one's information protected.
Application software plays a substantial role in network security. Today's applications may give bad actors the ability to gain access to your computer remotely. As stated in research I have done, “Once the scammer has convinced you to give them remote access, they will ask you to install a software program like AnyDesk, GoToAssist, LogMeIn, or TeamViewer. These software programs allow someone from another computer to operate your computer as if they were sitting right in front of it” (Altenhofen, 2023). It is crucial to avoid such actions, as granting remote access to your computer gives someone else control over it.
Significant changes are coming with new AI (artificial intelligence), allowing you to encrypt your database so that bad actors, like those who use remote applications to steal your information, cannot gain access.
“A security architect is responsible for identifying and working to prevent potential cyber threats to an organization’s network and systems” (Chkadmin, 2023). This role ensures that businesses retain strong, knowledgeable employees to safeguard against cyber threats. A network architect helps a business remain resilient during attacks.
In conclusion, the evolution of network security is closely tied to the advancements in technology. It is crucial for individuals to understand the foundational principles to actively participate in securing sensitive information. The continuous development of biometric access, routers with advanced security features, and the integration of AI in encryption highlight the dynamic nature of network security. Employing professionals such as security architects is essential for businesses to stay ahead of potential cyber threats and maintain a secure operational environment.
Citations
Altenhofen, M. (2023, October 18). Remote Access Scam Alert: Did someone ask you to download software to access your electronic device? don’t fall for it! Oregon Department of Justice. https://www.doj.state.or.us/media-home/news-media-releases/remote-access-scam-alert-did-someone-ask-you-to-download-software-to-access-your-electronic-device-dont-fall-for-it/#:~:text=Once%20the%20scammer%20has%20convinced,right%20in%20front%20of%20it.
Chkadmin. (2023, September 7). Network security architecture. Check Point Software. https://www.checkpoint.com/cyber-hub/network-security/what-is-network-security/network-security-architecture/
The history and evolution of network security. Avast. (n.d.). https://www.avast.com/en-us/business/resources/future-of-network-security#pc
Jayaraman, S. (2023, June 16). What is an access control list (ACL) and why do you need it? https://www.g2.com/articles/access-control-list

Comments
Post a Comment