Post #7: Tech Topic Connection

 My selected tech topic was network security. Network security connects to the fundamentals of information technology covered in this course because it “involves protecting both the hardware and software technologies used within a computer network, to safeguard data, devices, and systems from unauthorized access and malicious activities.” (ajith, 2024) In this course, we have learned about the hardware of computers, the different software that comes on computers, and the ways to protect personal data, secure devices, and the many ways that attackers try to access systems. 

Network security relates to the history of computers and how computers operate, as the internet became available to the public, causing an increase in people’s personal information being available online. This gave criminals a way to steal data from individuals and government agencies via the web. With network security threats increasing exponentially, the demand for firewalls and antivirus programs also increased. (Davies, 2021) 

Network security relies on the hardware components and functions of a modern computer system, such as firewalls and routers. These are important for preventing unauthorized access, blocking malicious traffic, and directing traffic securely across networks. (What Is Network Security: Types, Best Practices, and Emerging Trends, 2024) 

Network security uses programming languages and program execution methods to conduct threat analysis, extract insights from complex logs to detect subtle patterns, design customized response strategies for specific threats, and develop advanced algorithms to detect complex threats in network traffic. (Poclitari, 2024) 

Application software is a huge part of network security, as a lot of the software that we use today requires downloading and utilizing applications. Having network security helps to ensure that the applications don’t have any harmful or inappropriate content. 

Network security applies to databases and database management, as security measures are necessary to ensure that only authorized users can access data. These security measures allow different users to different permission levels based on the information that is deemed necessary for users to access. The database management systems, which assist in creating and managing the database, also require specific security measures. (Tech+, 2025) 

The basic concepts of network architecture, management, and security influence network security, as network security is a basic necessity for each of these components. The architecture and management of a network need network security to provide protection for its data and hardware components. Without network security, all of these things run the risk of being overtaken or compromised.

Comments

Popular posts from this blog

Post #1: Programming Languages

Post #5: Tech Topics

Post #4: The Blog Design Plan