Post 7 Adrian's Tech Topic: Cybersecurity and Network Security


       
Network and Cyber Security is very important in today’s society. Cybercrimes on the rise in recent years, I want to discuss some cyber techniques that could be used to get your information and how to help decrease the chance that you could become a victim. Also discussing some good practices to use at home and work to keep you and your family’s information safe.
          I would like to go in a little bit more detail on this topic from my post about network security. This topic is talking about in the later weeks of this course, in chapters 7 & 8 in (Frank Vahid / Professor of Computer Science and Engineering / Univ. of California, August 2017). Chapter 7 is the privacy chapter in this textbook but do we really have privacy?!?! This generation with all the social media websites
and apps out there and people taking pictures of their step. If you are online and searching the internet you are could be leaving a digital footprint of what you have been looking at and or activity that you are doing.  A lot of social media websites, regular websites, and apps ask for your location, access to make phone calls, get access to your contacts, and access to your microphone so that you leave a digital footprint.  “Apps and sites like those log your data such as IP address, request to view a web page, and user post. (Frank Vahid / Professor of Computer Science and Engineering / Univ. of California, August 2017)” A good practice to implement or continue to use is to periodically check and update the privacy settings in your phone or tablet or whatever device you are using. This is a good way to add additional security against those that are trying to get your information.
         
Cybersecurity and network security go hand and hand Ch. 8. Talks about security. The definition of Computer security “is the prevention of unauthorized computer access, including viewing, changing, or destroying a computer or data (Frank Vahid / Professor of Computer Science and Engineering / Univ. of California, August 2017)” Since the beginning of the computer age back in 1940 security is a big part of one the life cycle of the computer or device.  Back in the 1940s computers took up an “entire room and they were used for the military purpose for codebreaking in WWII and calculating the paths of bombs. (Frank Vahid / Professor of Computer Science and Engineering / Univ. of California, August 2017) Ch. 1.” In the 1900s (information age) people were using computers more and more for creating/managing information.  Security back then was not so advance as it is not back then all they need was to lock the door and have a door guard there 24/, now we need to have what I can say is whole lot of locked doors and door guards to watch and protect our information. We have process in place to help prevent us from having a security breach and/or getting hacked which is the most common form of a security breach.
          One way of defining a “Hack” is a malicious security breach done by unauthorized access. (Frank Vahid / Professor of Computer Science and Engineering / Univ. of California, August 2017)” The computer hardware used to hack does not have to be that advance. I was talking to a co-worker of mine who is in the field and he just told me “that he was reading a report that had a company be hacked through a Wi-Fi enable thermometer. He also said that he believes there was a British bank was hacked by their own CCTV cameras through a botnet.” That is crazy that you are not safe from a thermometer, or even possibly your own security camera system. That is why cybersecurity and network security are big deal in this field.  The equipment need to fight against this type of thing does not need to be that sophisticated either, here are a few steps of things that can help you to not get hacked by a Wi-Fi enable microwave:
1.    “Use strong Passwords such as using upper and lowercase letters, numeric, and special characters. I.E Bo$$M@n2018.
2.   Install layers of security such as anti-malware software, anti-virus software and add 2 step verification, PIN, Bio-metrics, turning off data sharing. Never install apps from anywhere other than official app stores or sources.  
3.   Be careful about what you and your family are doing online so not get to scammed or inappropriate. (Standard, 2018).”
      
    The programming language for cyber and network security are very popular Javascript, python, C++. Virus programs are written using these programming languages, knowing and learning these for the IT field I believe is essential to stop threats to whatever network that you work for.  
          Both cyber and network security are import to database and database management. One of the big databases is AWS (Amazon Web Services) amazon database is huge. The DOD has gone with them for a few years now and with that that means Government has all of their information on amazon servers.  Talking to another co-worker who was doing a paper on AWS he said “that the reason the government went with AWS because each server is separated so that if one server gets compromised it cannot get to the other servers that AWS owns.”
 
References:
-       INT 100 Text Book (Frank Vahid / Professor of Computer Science and Engineering / Univ. of California, August 2017)
-       Network Security Basic (Professional, 2001)
-       Get Back to Basics and boost your cybersecurity (Standard, 2018)
-       https://aws.amazon.com/  

Comments

Popular Posts