When considering network security, every aspect of information
technology, as well as the history of computers in general, plays a part. Discussing
network security requires the insights gained from these topics and will influence
the topic for the foreseeable future. In this post, I will give a brief
breakdown of these topics in relation to network security, and how each aspect
can be related.
Without a basic understanding of information technology,
network security cannot be attained. Knowledge of the fundamental aspects of
how technology works is essential to creating a secure environment. Computers
utilize pulses of electricity to feed information in the format of ones and zeroes
to compute and display information. Network security must be formatted in the
same way. To achieve it, one must potentially master these concepts. Not for
the simple user, mind you, but for the teams of educated people who create the software
and hardware for computers to use as security.
Indeed, network security relies upon software and
hardware. Manufacturers are more often creating custom chipsets for unique
devices that are deployed. Because these chipsets may be used for only a small
(but important) number of devices, the review of the security features are not
as intense as those of chipsets that are used in a large number of devices worldwide
(Froehlich, 2020). This can lead to hackers finding vulnerabilities and
exploiting them. Therefore, rigorous hardware testing and requirements are
vital to network security.
In addition to hardware, software is just as vital. The programming
languages that are used to create software must be taken into consideration.
Though it all translates into ones and zeroes, the features of software must be
put through serious testing to ensure that hacking methods cannot be utilized
against it. Every level of programming must be thought of, including the high-level
programming languages such as Python used to create it, as well as the machine and
assembly languages used at a lower level.
Even the use of common office computer software applications
are important when it comes to network security. A user of Microsoft Office may
input sensitive company information in Microsoft Word or Excel and then
unwittingly put it on a company server, making it vulnerable to attack or
theft. The security of database management systems used to sort and track customer
or employee information is extremely important as well. Should customer or
employee data be compromised, consumers may find out and not be confident enough
that if they purchase your services, their data will remain safe (IBM, 2024).
Finally, understanding the importance of the history of
information technology and computers is essential. The computer is arguably the
most important invention in the 20th century (Encyclopedia.com,
2024). Computers are used in every piece of society, from law enforcement to
personal business, to social media. Its beginnings are as important to network
security as the current and latest technological advances. Consider that the
mistakes made in early computer development that led to the first security
incidents in the 1950s may have been avoided if security had been tighter from
the beginning. There is a famous saying when it comes to history, that if you
forget the past you are condemned to repeat it (Rowe, et al., 2010). This holds
true in relation to the history of information technology of computers. We must
have a deep understanding of the roots of computer development, as well as the
ramifications if that history is forgotten.
Network security remains vital to information technology.
From the programming languages used to create software, to the hardware
components that make up devices, security of computers and information must
stay a top priority. As technology advances in complexity and importance, cyber
threats will advance as well, making security perhaps the most important aspect
of the future.
References
Encyclopedia.com. (2024). The History,
Development, and Importance of Personal Computers. Retrieved from
Encyclopedia:
https://www.encyclopedia.com/science/encyclopedias-almanacs-transcripts-and-maps/history-development-and-importance-personal-computers
Froehlich, A. (2020, November 20). What
are the biggest hardware security threats? Retrieved from Tech Target:
https://www.techtarget.com/searchsecurity/tip/What-are-the-biggest-hardware-security-threats
IBM. (2024). What is database
security? Retrieved from IBM:
https://www.ibm.com/topics/database-security
Rowe, DO, T., Ziegelstein, MD, R.
C., & Jones, MD, J. (September). Those Who Forget Their History Are
Condemned to Repeat It. Retrieved from The American Journal of Medicine:
https://www.amjmed.com/article/S0002-9343(10)00398-0/abstract
Comments
Post a Comment