Skip to main content

 

Network Security Connection

            Network security is very important in today’s world, and it will continue to be an essential part of the future of the cyber world. With each new technological advancement, there is a threat that arises that is set in motion to try and exploit that new technology. From the dawn of the first home computers, some seek to use those same systems with malicious intent. Cybercrime is the fastest-growing form of criminal activity (Vahid & Lysecky, 2017). The growing rate of cybercrime means there must be people at the forefront trying to protect against it and it starts with protecting networks as well as devices that are in use. Network security is a cornerstone to any computer database and this security needs to stay prepared for any cyber threat that will try to take advantage of its users.

           Having a reliable network requires having reliable hardware and that hardware needs to be protected as well. The hardware one must be using be safe for its users. Once a device is compromised it could spread to other devices and could be extremely costly if the devices are no longer salvageable. Having good network security can help keep these damages from happening and some can help implement that security for those that don’t know to do so. There are plenty of methods that one can use to provide protection and it starts with telling a device or program what to do. All devices and programs out there must be directed on how to operate so understanding computer language becomes part of the job for those in the field.  Those that study and master this technology have their work cut out for them when it comes to protecting the information traveling on that new technology.

There are programs out there being built for security and one of the most prominent ones is encryption programs. As technology continues to push the boundaries of the cyberworld so must the way we protect those that use it. In the new age of wireless networks, some see the threats that are on the horizon and are coming up with new ways of protecting the air service. Added layers of protection especially with encryption are needed to make sure that the information that is transported over the air arrives at both ends without being compromised (Gong et al., 2021). The more security measures that are provided to users to receive and send information makes those that are trying to take advantage of that information less of a threat. Those that provide a service on their network must make sure those that use their network are protected because it could ruin lives if their information is stolen.

From a hardwired network to a wireless network, network security is needed on all fronts. Computers have proven themselves an invaluable resource and these devices need to have that added layer of security for those that use them. Some seek to use these same devices for villainous purposes but some are doing the work to keep them from achieving that goal. The devices that are used throughout the world to help humans move forward need to be safe and reliable to continue to make the world better. This is the information age, and the information must continue to flow around the world safely.

 

References

Gong, X., Zhang, Q., Zhang, X., Xuan, R., & Guo, L. (2021). Security Issues and Possible Solutions of Future-Oriented Optical Access Networks for 5G and Beyond. IEEE Communications Magazine, Communications Magazine, IEEE, IEEE Commun. Mag59(6), 112–118. https://doi-org.proxy-library.ashford.edu/10.1109/MCOM.011.2100044

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

Comments

Popular posts from this blog

Computers are changing the way we work   The construction industry has seen many changes over the years when it comes to computer technology. The man I call dad has been in the construction industry since before I was born but it is not until recent years that he has needed to learn how to use a computer for work. The industry has used things like blueprints to erect structures from the ground up. Now they are using iPads & tablets on the construction site to guide them while they build these structures. There isn’t a need to use physical blueprints anymore since they can be accessed from a mobile device and with this mobile device many more features can be added. The construction industry can and has benefitted from the information technology industry. The devices they use in the construction industry need to be secure to carry information to the job site and workers there. The devices need to be secure to make sure the information or the device is not compromised. The devices...
Information Highway  Sending and receiving information on the internet does have its snags at times and having ways to help determine what causes them can help make that information travel better. I have used ping and traceroute extensively due to my line of work. I work for an internet service provider and running ping tests can come in handy when a customer is experiencing slow internet speeds. When you run a ping test to a certain destination you are sending packets to that place and awaiting a response. This can help determine if the line of communication to that destination is a clear one and if there isn’t a clear route for that packet it can be lost. If the packet of information doesn’t make it to its destination it could be resent causing a slight delay to that information. Traceroute is used to see the number of places a packet must hit before reaching its destination. Each server it hits is marked down along with the amount of time it took to reach that server. I did a ...