Final Project
A topic that is always evolving and needs constant attention
to keep us safe is network security. Cyber security is always updating and
scanning for potential attacks. Scammers are constantly trying to figure out a
way to attack us and prosper. The security field needs just as many people and
resources to put up protection against these attacks. The reason I like this
topic is because it draws the need for being alert and implanting security
measures. Plus, today’s technology is constantly growing and advancing, which
means there will be more and more jobs in cyber security.
Network security is an important role in many ways. It
relates to most IT fundamentals. Whether you’re ordering something off of
Amazon or just browsing the internet, your computer is implementing security
measures that you may not even know of. The vast majority of us use the
internet and do some kind of work on it. This calls for security measures against
hackers and scammers. Cybercrime is rising each year as hackers find new security
holes or different ways to get into others’ computers. According to J. Jinquan,
M. A. Al-Absi, A. A. Al-Absi and H. J. Lee (2020), “After the rise of
the Internet, computer network hackers developed a “backdoor” technology that
allowed them to break into other network systems again and again.” If
you’ve ever been unornate enough to get your identity stolen or infected with a
virus, then you know that security is very important. Encryptions are a big protection
for emails against hacks and breaches. This happens mostly without us even knowing.
Along with our emails automatically sending unwanted and harmful emails to our
spam or junk inbox. Cryptography is a big security measure that protects us
when we go to websites such as Amazon. No matter what we do on our computer,
our security is always running.
Computer science helps evolve network security. As we look to the history of computers and
how they operate, we learn that security measures have to be continuously
evolving and on the look out for risks. When computers were first invented,
there was no need for computer security. There was no Norton or other antivirus
software. Computers weren’t used to access bank accounts, purchase items, or send
money. Plus, the networks weren’t as big and connected as they are today.
Computers operate faster than we can think and if your virus is infected, then
it may be much slower. That is because it may be part of a botnet and sending
more harmful emails to other known emails. When time goes on, more and more
security measures are going to be added.
Network security heavily relies on major hardware
components and functions of a computer. For example, if your hard drive crashes
and is useless then you cannot use your computer at all and that means you are
not able to monitor your Norton security program. On the positive side, you won’t
be able to browse and pick up possible viruses either. Your antivirus is always
protecting your computer or backing it up. It will be using some of your memory and can
possibly slow up your computer if you’re doing too many things at once. So having a bigger RAM is always good in my
opinion.
Network security uses hybrid public-key and symmetric-key
cryptography to keep messages secure. The keys can be a random secret key that
randomly generates. Then a whole new key during the next session. If you look
at your web browser, you can see the lock symbol to the left of the address
bar, it tells you that the website has secure transmissions. These keys are
created so that no one can see what is being transferred, unless they somehow
decipher the mathematical equation.
Application can be
a major part of network security. There
are so many viruses out there and many more coming. According to AV-Test
(2020), “Every day, the AV-TEST Institute registers over 350,000 new malicious
programs (malware) and potentially unwanted applications (PUA).” There
are over 1049 million malware that can infect your computer. One of the first
applications that you should put on your computer is an antivirus software. Due
to all the updates and already installed security measures on your mobile
phones, it is quite hard to get your phone infected. That is not a challenge.
If you’re not careful and download the wrong application, then you can be
setting yourself up for a disaster and a big headache.
Databases contain a lot of information. In the right setting,
it will contain a lot of sensitive information. Network security will be quite
high to guard this information. For example, a company many have all of someone’s
information. If a hacker was to get all this information, then identity theft
would be all likely possible. Network security would be implemented to keep all
the information safe.
Network architecture, management, and security keep me
interested in network security. Security is what I am pursing for as a degree.
Network architecture is fascinating, and I wish to keep learning about it and
better my blog. It can get complicated and I have a great idea for a blog that
I want to do but getting from point A to point B will be an adventure. Seeing
how the blog reacts to different changes is interesting.
References
J. Jinquan, M. A.
Al-Absi, A. A. Al-Absi and H. J. Lee, "Analysis and Protection of Computer
Network Security Issues," 2020 22nd International Conference on
Advanced Communication Technology (ICACT), Phoenix Park, PyeongChang,,
Korea (South), 2020, pp. 577-580.
Malware. Retrieved from
www.av-test.org/en/statistics/malware/.
Comments
Post a Comment