Post # 7 - Tech Topic Connection
My
Tech Topics will be Network Security and Privacy and how these two concepts
coincide with one another in a multitude of ways. My current career has progressed
within a team that considers cyber security to be of utmost importance. This is
especially prevalent in the current world, as technology continues to grow and
expand in many ways. With this progression comes just as much opportunity for
malicious attacks and the misuse of confidential information. Keeping member
information secure and confidential is essential to the job roles within a
business. There is an expectation made when members decide to utilize certain
services, and these expectations extend to the secure and responsible use of
their information.
One
thing that if prevalent in this course is how technology has evolved over time
and continues to do so. Just as security and privacy progress into more
impressive standards, the same is being done simultaneously with those who wish
to break through these security measures to use confidential information for
their own personal gain and profit. “The big data security technologies can be divided into four
levels: elimination, continuation, improvement, and innovation “(Zhu 2019).
Information is valuable, hence the need for proper security and the desire for
privacy. “These
features not only lead to a big difference between big data technology (DT) and
information technology (IT), but also promote the upgrading and evolution of
network security technology” (Zhu 2019). For as long as technology
continues to evolve and update, there will always be a need to evolve and
update security and privacy as well. Data privacy was as simple as locking a door
that led to a room full of computers. Due to how technology has evolved into a
more wireless being, there is more potential for security breaks and malicious attempts
at information stealing.
In terms of relying on hardware, Network Security
benefits from the use of Firewalls which monitor incoming and outgoing traffic.
This allows the security of a system to decide whether to allow or deny access
to specific traffic based on a predetermined set of rules/precautions. Privacy
also relies on this security but can also rely heavily on long term memory
discs. This can even include use of an external hard drive, where more confidential
information can be stored on a more secure platform. This type of storage
cannot be tampered with simply through a network connection if the drive is
kept unplugged from a device. Network Security and Privacy are maintained and
built on programming languages, most popularly being Java, JavaScript, and
Python.
Software changes and updates are a constant
within Network Security and Privacy. Common security threats within
IP networks have potential to spread among other services like mobile networks.
This suggests that major software changes are critical to keeping information
private and secure within new networks (Liyanage 2016). This information and
code is often stored within a Database, which by definition is a collection of
information and data that is stored electronically. Database management systems
can store highly private and confidential information for a user. Network
architecture and Network Security should go together. As seen by Ali 2013,
there are common mistakes and errors within both that can cause flaws within a
supposedly secure system. A strong Network Architecture ensures a strong Network
Security, which in turn secures a strong amount of Privacy. This is essential because, it prevents
the institution from suffering any significant attacks associated with network”
(Ali 2013). Network management can regulate the effectiveness of applications through
proper monitoring. It is the responsibility of a Network’s management to make
certain that the infrastructure of a network remans secure and stable.
Otherwise, the integrity of a Network becomes questionable.
References
Zhu, Y., Zhang, Y., Wang,
J., Song, W., Chu, C.C., Liu, G. (2019). From Data-Driven to Intelligent-Driven:
Technology Evolution of Network Security in Big Data Era.
Liyanage, M., Abro, A.
B., Ylianttila, M., Gurtov, A. (2016). Opportunities and Challenges of
Software-Defined Mobile Networks in Network Security.
Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X.
(2016). Software-Defined Mobile Networks Security.
Ali, M. N. B., Rahman, M. L., Hossain, S. A. (2013). Network architecture
and security issues in campus networks.
Comments
Post a Comment