Tech Topic Connection: Cyber Security


Cyber security is an essential part of information technology because it is not enough to just create a program, blog, or application; you must also consider how to protect users and their information. Cyber security must be considered at every level, because it affects every level of information technology. Poor security leaves websites open to attacks from hackers like Denial of Service attacks or computer systems vulnerable to malware. Security must even be considered at the user level because users need to be educated on how to practice good security and avoid scams like phishing, spam, fraud, and social engineering.

Ever since computers have been designed, security has been important. Even from the early days of computers, it was necessary to secure memory, especially for military computers. As computers have evolved, it has been necessary to create new methods of keeping information secure. The countries with advanced technology must have better network security to keep classified information safe. For example, the advent of the internet opened new opportunities for security breaches, and thus need for new security measures. As more people use vital services like banking online, the need for strong security becomes more critical. The rise of mobile devices has also introduced new security needs for many people. Evan Ramzipoor, writing for Forbes says, “Threat actors don’t sleep, so cybersecurity shouldn’t either.”

Network security is related to both hardware and software. Therefore, it is important to have strong security for a computer or network’s hardware and software. Malicious software could gain access to a network with a physical item like a flash drive, or a skimming device placed on an ATM at a bank. Spectre and Meltdown are two high-profile vulnerabilities that exploited a flaw in Intel processors to access even restricted information (CISA, 2018). These security flaws required operating system updates to prevent hackers exploiting them. Good security for software includes measures like passwords with good requirements, two-factor authentication and security tokens. Software can even use physical tokens for more critical information.

Although both are vulnerable, computer systems are primarily hacked through software outlets, not hardware outlets. Flaws and vulnerabilities in software or OS code can result in opportunities for hackers. Each code has its own unique security flaws that must be accounted for. However, some languages are more vulnerable than others. For example, one study found that over 50% of programs written in PHP and C++ had high-severity flaws (Tung, 2020). Additionally, hackers can code malicious software that can be installed on thousands of machines. Because of this, users should be careful to keep good antivirus software and keep their operating systems up-to-date as patches are often released to fix security vulnerabilities.

Applications, whether on mobile or desktop platforms, can be used to steal information. Many times a user can be tricked, especially on mobile platforms, into giving an app permission to access information that will be used for harmful purposes. Using trusted stores like the App Store or Google Play helps prevent the user from downloading malicious apps. Because of the extra need for security, companies often improve network security further by forbidding users to download apps or visit harmful websites.

A database is used to store information. Whichever database software is used, it is necessary to establish security measures to keep the information safe. Many of the methods already detailed, such as keeping software updated, are critical to maintaining good security for databases.

Security is intricately connected to network architecture and management and cannot be ignored. Networks must be built and maintained with security in mind, and management must establish proper security measures and information hygiene to keep information secure. From top to bottom, every part of a system must be designed with security in mind. This means building hardware in safe ways, patching software vulnerabilities, and keeping users educated about the best ways to keep them, and their information, safe.

   

References:

CISA. (2018, May 1). Meltdown and Spectre Side-Channel Vulnerability Guidance | CISA. Retrieved August 1, 2022, from https://www.cisa.gov/uscert/ncas/alerts/TA18-004A

Fredman, B. C. (2016, January 25). How to Protect Yourself From Phishing. Consumer Reports. Retrieved July 25, 2022, from https://www.consumerreports.org/money/how-to-protect-yourself-from-phishing/

Garrett, N. (2019, November 19). Rethinking Information Security. Forbes. Retrieved July 25, 2022, from https://www.forbes.com/sites/forbestechcouncil/2019/11/19/rethinking-information-security/?sh=770b5ab43816

Tung, L. (2020, December 16). Programming language security: These are the worst bugs for each top language. ZDNet. Retrieved August 1, 2022, from https://www.zdnet.com/article/programming-language-security-these-are-the-worst-bugs-for-each-top-language/

Ramzipoor, E. (2022, June 6). Cybersecurity Takes Center Stage. Forbes. Retrieved July 19, 2022, from https://www.forbes.com/sites/servicenow/2022/06/03/cybersecurity-takes-center-stage/?sh=2b822eec40ec

Wilson, J. (2022, July 25). Scammers Are Cracking Today’s More Secure Passwords — Here’s What You Can Do. Forbes Advisor. Retrieved July 25, 2022, from https://www.forbes.com/advisor/personal-finance/personal-finance-scammers-crack-one-time-passwords/

Comments

Popular Posts

Programming Languages

Network Security