Search This Blog

Final: Tech Topic Connection

  Week 5 Final Project Blog Post:               Information technology (IT) is a dynamic and exciting field that has limitless possibili...

Monday, April 22, 2024

Final: Tech Topic Connection

 

Week 5 Final Project Blog Post:

 

            Information technology (IT) is a dynamic and exciting field that has limitless possibilities and avenues that can be pursued. The main effort of IT and its abilities is to manage and process information, spanning across countless fields. This blog post explores the fundamentals of information technology through the lens of the specific topic of cybersecurity. We will explore how cybersecurity integrates into the various aspects of IT, focusing on the areas of computer science concepts, hardware components, programming languages, application software, databases, and network architecture. By examining all of these, we can see just how in depth cybersecurity and IT really is.

           

            In a world where computers and their information needs to be protected due to constant attacks, cybersecurity is an integral aspect. Cybersecurity focuses on protecting computer systems, networks, and information from attacks, damage, and prying eyes that are not otherwise authorized to access the available information. To understand cybersecurity, one must have a solid grasp on the concepts that are synonymous with computers such as algorithms, data structures, and computational theory. Applying all of these concepts are the bedrock for ensuring secure computer systems and even data encryption.

 

            The history of computers and cybersecurity are closely related. In the early days of computers, there were security concerns that evolved as technology did. Gone were the days of keeping paper data files and records locked and stored in a secure vault. The computer and its ability to generate and store information was advancing and progressing faster than anyone had imagined. The problem arose with keeping the information that was being generated and stored on these devices safe from unauthorized users. Modern cybersecurity practices stem from a deep understanding of how computers are built, how the operating systems function, and general software development principles. Encrypting and authentication are rooted in computer science theories and methodologies.

 

            Cybersecurity heavily relies on the hardware components and functions of the computer system. Case in point, cryptographic algorithms harness the processing power of the CPU’s in order to both encrypt and decrypt information. Hardware security on the other hand provide secure storage for crypto keys. There are network security appliances such as firewalls and intrusion detection systems that are designed for packet inspection and analysis.

 

            Programming languages are vital in the development of security protocols, implementing defensive measures, and conducting vulnerability assessments. Programming languages like C, Python, and Java all offer their own unique advantages when dealing with different aspects of research and development of security. There are different methods such as dynamic analysis and fuzzing, both essential when there is a need to identify vulnerabilities in software.

 

            Application software is another key tool in cybersecurity because it provides the necessary tools needed for monitoring, analyzing, and responding to security threats that may present themselves. Security information and event management (SIEM) software collect log data from different sources so the computer can detect suspicious activity and thwart potential security threats. “A SIEM‐based framework can be used for centralized and integrated management of the ten automatable security controls” (Montesino, R., Fenz, S., & Baluja, W., 2012). Antivirus software uses signature-based detection to locate and remove malware that may have entered the system. In addition to all of these applications, endpoint security solutions protect devices from unauthorized access and harmful software.

 

            Cybersecurity aligns with database concepts and management through the protection of the sensitive and valuable information that is stored in databases. Encryption, controlling access, and masking data are all used to keep the information safe from breaches in data by unauthorized users. Database management systems (DBMS) play a vital role in keeping the integrity of data by applying security measures like role-based access control and transaction logging. DBMS have changed the way that many organizations operate. (Chopra, R., 2010)

 

            In conclusion, cybersecurity is a critical component of information technology. It encompasses a wide variety of concepts and practices that have been developed over the years alongside the technology itself. There is a fine balancing act to ensure that the cybersecurity measures stay on pace, if not ahead, of the advancements that are being made in the information technology field. Being able to understand principles like hardware components, programming, applications, databases, and network architecture are crucial for someone in the cybersecurity world.

 

References

Chopra, R. (2010). Database Management System (DBMS) A Practical Approach. S. Chand Publishing.

Montesino, R., Fenz, S., & Baluja, W. (2012). SIEM‐based framework for security controls           automation. Information Management & Computer Security20(4), 248-263.

 

 

No comments:

Post a Comment