Tech Topic Connection: Cyber Security
Cyber security is an essential part of information technology because it is not enough to just create a program, blog, or application; you must also consider how to protect users and their information. Cyber security must be considered at every level, because it affects every level of information technology. Poor security leaves websites open to attacks from hackers like Denial of Service attacks or computer systems vulnerable to malware. Security must even be considered at the user level because users need to be educated on how to practice good security and avoid scams like phishing, spam, fraud, and social engineering.
Ever since computers have been designed,
security has been important. Even from the early days of computers, it was
necessary to secure memory, especially for military computers. As computers
have evolved, it has been necessary to create new methods of keeping
information secure. The countries with advanced technology must have better
network security to keep classified information safe. For example, the advent
of the internet opened new opportunities for security breaches, and thus need
for new security measures. As more people use vital services like banking
online, the need for strong security becomes more critical. The rise of mobile
devices has also introduced new security needs for many people. Evan Ramzipoor, writing for Forbes says,
“Threat actors don’t sleep, so cybersecurity shouldn’t either.”
Network security is related to both hardware
and software. Therefore, it is important to have strong security for a computer
or network’s hardware and software. Malicious software could gain access to a
network with a physical item like a flash drive, or a skimming device placed on
an ATM at a bank. Spectre and Meltdown are two high-profile vulnerabilities that
exploited a flaw in Intel processors to access even restricted information
(CISA, 2018). These security flaws required operating system updates to prevent
hackers exploiting them. Good security for software includes measures like passwords
with good requirements, two-factor authentication and security tokens. Software
can even use physical tokens for more critical information.
Although both are vulnerable, computer systems
are primarily hacked through software outlets, not hardware outlets. Flaws and
vulnerabilities in software or OS code can result in opportunities for hackers.
Each code has its own unique security flaws that must be accounted for.
However, some languages are more vulnerable than others. For example, one study
found that over 50% of programs written in PHP and C++ had high-severity flaws
(Tung, 2020). Additionally, hackers can code malicious software that can be
installed on thousands of machines. Because of this, users should be careful to
keep good antivirus software and keep their operating systems up-to-date as
patches are often released to fix security vulnerabilities.
Applications, whether on mobile or desktop
platforms, can be used to steal information. Many times a user can be tricked,
especially on mobile platforms, into giving an app permission to access information
that will be used for harmful purposes. Using trusted stores like the App Store
or Google Play helps prevent the user from downloading malicious apps. Because
of the extra need for security, companies often improve network security
further by forbidding users to download apps or visit harmful websites.
A database is used to store information.
Whichever database software is used, it is necessary to establish security measures
to keep the information safe. Many of the methods already detailed, such as
keeping software updated, are critical to maintaining good security for
databases.
Security is intricately connected to network
architecture and management and cannot be ignored. Networks must be built and
maintained with security in mind, and management must establish proper security
measures and information hygiene to keep information secure. From top to
bottom, every part of a system must be designed with security in mind. This
means building hardware in safe ways, patching software vulnerabilities, and
keeping users educated about the best ways to keep them, and their information,
safe.
References:
CISA. (2018, May 1). Meltdown and Spectre Side-Channel
Vulnerability Guidance | CISA. Retrieved August 1, 2022, from
https://www.cisa.gov/uscert/ncas/alerts/TA18-004A
Fredman, B. C. (2016, January 25). How
to Protect Yourself From Phishing. Consumer Reports. Retrieved July 25,
2022, from
https://www.consumerreports.org/money/how-to-protect-yourself-from-phishing/
Garrett, N. (2019, November 19). Rethinking
Information Security. Forbes. Retrieved July 25, 2022, from
https://www.forbes.com/sites/forbestechcouncil/2019/11/19/rethinking-information-security/?sh=770b5ab43816
Tung, L. (2020, December 16). Programming
language security: These are the worst bugs for each top language. ZDNet.
Retrieved August 1, 2022, from
https://www.zdnet.com/article/programming-language-security-these-are-the-worst-bugs-for-each-top-language/
Ramzipoor, E. (2022, June 6). Cybersecurity Takes Center
Stage. Forbes. Retrieved July 19, 2022, from
https://www.forbes.com/sites/servicenow/2022/06/03/cybersecurity-takes-center-stage/?sh=2b822eec40ec
Wilson, J. (2022, July 25). Scammers Are Cracking Today’s
More Secure Passwords — Here’s What You Can Do. Forbes Advisor. Retrieved
July 25, 2022, from
https://www.forbes.com/advisor/personal-finance/personal-finance-scammers-crack-one-time-passwords/

Comments
Post a Comment