Network security is no different from leaving a front door to unlock or a vehicle door. Network security can go as far as an unlocked window on the second floor. Each of these scenarios is a security hole – whether it is a virus, spam, phishing, password cracking, or social engineering. These are threats because computers are not smart. (Sean, 2020) A computer is not designed to know who is accessing what. That is why there are security features.
Some symptoms may include a system that is slowed down dramatically or personification through social media. Nefarious people will wrack havoc. A person may also get locked out of an account.
A concern for any individual is if a nefarious person got an IP address for a specific computer. The use of ping could give said individual more information to access the network than what would be normally accessible without security precautions. Something as simple as e-mail spam or phishing can lead to other issues such as viruses or security holes.
Military service expresses the concern for cyber security from infancy. There are many levels to this security, and all are protected. It goes so far into speech and technical footprints. The key thing to remember regarding cyber security is that there are cyber persons smarter and can access more than we would like. These entities will infiltrate our social media, e-mail, browsing, or any internet activity we may partake.
When you leave your door unlocked, leave keys in the passenger seat, or use simple identifiable passwords, you are asking for an insurrection into your personal life. Cyber security is more than important internationally but personally as well. A computer is not responsible for our irresponsibility. Our demise is our own if we do not take responsibility for our own e-footprint. Keep your doors and windows locked.
References
Larson, Q. (2017, November 06). How to write technical blog posts . Retrieved from YouTube: https://www.youtube.com/watch?v=YODPgBadj80&ab_channel=freeCodeCampTalks
Sean, S. a. (2020, April 21). Introduction to Programming and Computer Science - Full Course. Retrieved from YouTube : https://www.youtube.com/watch?v=zOjov-2OZ0E&ab_channel=freeCodeCamp.org
Vahid, F., Lysecky, S., Wheatland, N., & Siu, R. (2019). TEC 101: Fundamentals of Information Technology & Literacy. Retrieved from zyBooks: https://learn.zybooks.com/zybook/TEC101:_Fundamentals_of_Information_Technology_&_Literacy_(TED2241A)?modal_name=about-zybook
Comments
Post a Comment