Tech Topic Connection

 


            When considering network security, every aspect of information technology, as well as the history of computers in general, plays a part. Discussing network security requires the insights gained from these topics and will influence the topic for the foreseeable future. In this post, I will give a brief breakdown of these topics in relation to network security, and how each aspect can be related.

            Without a basic understanding of information technology, network security cannot be attained. Knowledge of the fundamental aspects of how technology works is essential to creating a secure environment. Computers utilize pulses of electricity to feed information in the format of ones and zeroes to compute and display information. Network security must be formatted in the same way. To achieve it, one must potentially master these concepts. Not for the simple user, mind you, but for the teams of educated people who create the software and hardware for computers to use as security.

            Indeed, network security relies upon software and hardware. Manufacturers are more often creating custom chipsets for unique devices that are deployed. Because these chipsets may be used for only a small (but important) number of devices, the review of the security features are not as intense as those of chipsets that are used in a large number of devices worldwide (Froehlich, 2020). This can lead to hackers finding vulnerabilities and exploiting them. Therefore, rigorous hardware testing and requirements are vital to network security.

            In addition to hardware, software is just as vital. The programming languages that are used to create software must be taken into consideration. Though it all translates into ones and zeroes, the features of software must be put through serious testing to ensure that hacking methods cannot be utilized against it. Every level of programming must be thought of, including the high-level programming languages such as Python used to create it, as well as the machine and assembly languages used at a lower level.

            Even the use of common office computer software applications are important when it comes to network security. A user of Microsoft Office may input sensitive company information in Microsoft Word or Excel and then unwittingly put it on a company server, making it vulnerable to attack or theft. The security of database management systems used to sort and track customer or employee information is extremely important as well. Should customer or employee data be compromised, consumers may find out and not be confident enough that if they purchase your services, their data will remain safe (IBM, 2024).

            Finally, understanding the importance of the history of information technology and computers is essential. The computer is arguably the most important invention in the 20th century (Encyclopedia.com, 2024). Computers are used in every piece of society, from law enforcement to personal business, to social media. Its beginnings are as important to network security as the current and latest technological advances. Consider that the mistakes made in early computer development that led to the first security incidents in the 1950s may have been avoided if security had been tighter from the beginning. There is a famous saying when it comes to history, that if you forget the past you are condemned to repeat it (Rowe, et al., 2010). This holds true in relation to the history of information technology of computers. We must have a deep understanding of the roots of computer development, as well as the ramifications if that history is forgotten.

            Network security remains vital to information technology. From the programming languages used to create software, to the hardware components that make up devices, security of computers and information must stay a top priority. As technology advances in complexity and importance, cyber threats will advance as well, making security perhaps the most important aspect of the future.

 

 

 

References

Encyclopedia.com. (2024). The History, Development, and Importance of Personal Computers. Retrieved from Encyclopedia: https://www.encyclopedia.com/science/encyclopedias-almanacs-transcripts-and-maps/history-development-and-importance-personal-computers

Froehlich, A. (2020, November 20). What are the biggest hardware security threats? Retrieved from Tech Target: https://www.techtarget.com/searchsecurity/tip/What-are-the-biggest-hardware-security-threats

IBM. (2024). What is database security? Retrieved from IBM: https://www.ibm.com/topics/database-security

Rowe, DO, T., Ziegelstein, MD, R. C., & Jones, MD, J. (September). Those Who Forget Their History Are Condemned to Repeat It. Retrieved from The American Journal of Medicine: https://www.amjmed.com/article/S0002-9343(10)00398-0/abstract

 

 

Comments