Week 5 Final Project Blog
Post:
Information technology (IT) is a dynamic and exciting
field that has limitless possibilities and avenues that can be pursued. The main
effort of IT and its abilities is to manage and process information, spanning
across countless fields. This blog post explores the fundamentals of
information technology through the lens of the specific topic of cybersecurity.
We will explore how cybersecurity integrates into the various aspects of IT,
focusing on the areas of computer science concepts, hardware components,
programming languages, application software, databases, and network
architecture. By examining all of these, we can see just how in depth
cybersecurity and IT really is.
In a world where computers and their information needs to
be protected due to constant attacks, cybersecurity is an integral aspect. Cybersecurity
focuses on protecting computer systems, networks, and information from attacks,
damage, and prying eyes that are not otherwise authorized to access the
available information. To understand cybersecurity, one must have a solid grasp
on the concepts that are synonymous with computers such as algorithms, data
structures, and computational theory. Applying all of these concepts are the
bedrock for ensuring secure computer systems and even data encryption.
The history of computers and cybersecurity are closely
related. In the early days of computers, there were security concerns that
evolved as technology did. Gone were the days of keeping paper data files and
records locked and stored in a secure vault. The computer and its ability to
generate and store information was advancing and progressing faster than anyone
had imagined. The problem arose with keeping the information that was being
generated and stored on these devices safe from unauthorized users. Modern cybersecurity
practices stem from a deep understanding of how computers are built, how the
operating systems function, and general software development principles. Encrypting
and authentication are rooted in computer science theories and methodologies.
Cybersecurity heavily relies on the hardware components
and functions of the computer system. Case in point, cryptographic algorithms
harness the processing power of the CPU’s in order to both encrypt and decrypt
information. Hardware security on the other hand provide secure storage for
crypto keys. There are network security appliances such as firewalls and
intrusion detection systems that are designed for packet inspection and
analysis.
Programming languages are vital in the development of
security protocols, implementing defensive measures, and conducting
vulnerability assessments. Programming languages like C, Python, and Java all offer
their own unique advantages when dealing with different aspects of research and
development of security. There are different methods such as dynamic analysis
and fuzzing, both essential when there is a need to identify vulnerabilities in
software.
Application software is another key tool in cybersecurity
because it provides the necessary tools needed for monitoring, analyzing, and
responding to security threats that may present themselves. Security information
and event management (SIEM) software collect log data from different sources so
the computer can detect suspicious activity and thwart potential security
threats. “A SIEM‐based framework can be used for
centralized and integrated management of the ten automatable security controls”
(Montesino, R., Fenz, S., & Baluja, W., 2012).
Antivirus software uses signature-based detection to locate and remove malware
that may have entered the system. In addition to all of these applications,
endpoint security solutions protect devices from unauthorized access and
harmful software.
Cybersecurity aligns with database concepts and
management through the protection of the sensitive and valuable information
that is stored in databases. Encryption, controlling access, and masking data
are all used to keep the information safe from breaches in data by unauthorized
users. Database management systems (DBMS) play a vital role in keeping the
integrity of data by applying security measures like role-based access control
and transaction logging. DBMS have changed the way that many organizations
operate. (Chopra, R., 2010)
In conclusion, cybersecurity is a critical component of
information technology. It encompasses a wide variety of concepts and practices
that have been developed over the years alongside the technology itself. There is
a fine balancing act to ensure that the cybersecurity measures stay on pace, if
not ahead, of the advancements that are being made in the information
technology field. Being able to understand principles like hardware components,
programming, applications, databases, and network architecture are crucial for
someone in the cybersecurity world.
References
Chopra, R. (2010). Database Management System (DBMS) A Practical Approach. S. Chand Publishing.
Montesino, R., Fenz, S., & Baluja, W. (2012). SIEM‐based framework
for security controls automation. Information Management & Computer Security, 20(4), 248-263.
No comments:
Post a Comment