Post # 7 - Tech Topic Connection

 

My Tech Topics will be Network Security and Privacy and how these two concepts coincide with one another in a multitude of ways. My current career has progressed within a team that considers cyber security to be of utmost importance. This is especially prevalent in the current world, as technology continues to grow and expand in many ways. With this progression comes just as much opportunity for malicious attacks and the misuse of confidential information. Keeping member information secure and confidential is essential to the job roles within a business. There is an expectation made when members decide to utilize certain services, and these expectations extend to the secure and responsible use of their information.

One thing that if prevalent in this course is how technology has evolved over time and continues to do so. Just as security and privacy progress into more impressive standards, the same is being done simultaneously with those who wish to break through these security measures to use confidential information for their own personal gain and profit. “The big data security technologies can be divided into four levels: elimination, continuation, improvement, and innovation “(Zhu 2019). Information is valuable, hence the need for proper security and the desire for privacy. “These features not only lead to a big difference between big data technology (DT) and information technology (IT), but also promote the upgrading and evolution of network security technology” (Zhu 2019). For as long as technology continues to evolve and update, there will always be a need to evolve and update security and privacy as well. Data privacy was as simple as locking a door that led to a room full of computers. Due to how technology has evolved into a more wireless being, there is more potential for security breaks and malicious attempts at information stealing.

In terms of relying on hardware, Network Security benefits from the use of Firewalls which monitor incoming and outgoing traffic. This allows the security of a system to decide whether to allow or deny access to specific traffic based on a predetermined set of rules/precautions. Privacy also relies on this security but can also rely heavily on long term memory discs. This can even include use of an external hard drive, where more confidential information can be stored on a more secure platform. This type of storage cannot be tampered with simply through a network connection if the drive is kept unplugged from a device. Network Security and Privacy are maintained and built on programming languages, most popularly being Java, JavaScript, and Python.

Software changes and updates are a constant within Network Security and Privacy. Common security threats within IP networks have potential to spread among other services like mobile networks. This suggests that major software changes are critical to keeping information private and secure within new networks (Liyanage 2016). This information and code is often stored within a Database, which by definition is a collection of information and data that is stored electronically. Database management systems can store highly private and confidential information for a user. Network architecture and Network Security should go together. As seen by Ali 2013, there are common mistakes and errors within both that can cause flaws within a supposedly secure system. A strong Network Architecture ensures a strong Network Security, which in turn secures a strong amount of Privacy. This is essential because, it prevents the institution from suffering any significant attacks associated with network” (Ali 2013). Network management can regulate the effectiveness of applications through proper monitoring. It is the responsibility of a Network’s management to make certain that the infrastructure of a network remans secure and stable. Otherwise, the integrity of a Network becomes questionable.

 

 

 

References

Zhu, Y., Zhang, Y., Wang, J., Song, W., Chu, C.C., Liu, G. (2019). From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era.

Liyanage, M., Abro, A. B., Ylianttila, M., Gurtov, A. (2016). Opportunities and Challenges of Software-Defined Mobile Networks in Network Security.

Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X. (2016). Software-Defined Mobile Networks Security.

Ali, M. N. B., Rahman, M. L., Hossain, S. A. (2013). Network architecture and security issues in campus networks.

Comments