Thursday, August 22, 2024

Network Security

Network Security

For this week's assignment I chose to research the topic of security holes and vulnerabilities in information technology. I’ve also decided to share how these issues affect one of my favorite PlayStation studios known to be Insonmniac Games. Security holes and vulnerabilities tend to pose a significant threat to everyone, including the military, businesses and organizations that are involved in the field of computer technology. These attacks usually affect physical or virtual networks that facilitate the integration of digital interactivity platforms. Singh, Jeong & Hyuk (2016). It's our job to understand these threats as technology advances, remaining up to date on what upcoming tech lies in the market to counter it or develop effective strategies to prevent security breaches that could jeopardize theft of personal information, records or files that may be crucial to everyone surrounding this field. 

Considering, just about each month all hardware and software will potentially need updates to either function well, protect against viruses or outdated apps that could lead to corrupted data. Other potential issues may be unexpected crashes, unrecognizable emails or even a sluggish system performance that might cause severe damages leaving your system vulnerable to be breached. It's important that we continue to practice counter measures, conducting annual training to recognize these threats. Therefore, all employees should continue to update their antivirus software and remember to block malicious spam or emails that could compromise all sensitive information. Human errors can place companies or individuals in legal repercussions. Therefore it's important to avoid user errors that can lead to theft or loss of data
I found this very common that people have the same passwords that are often reused across multiple applications which is fairly easy to remember. I too find myself having this due to laziness and convenience. Note, having this mindset can lead to insider threats, hacks or lockouts that can cause a vast amount of damage to yourself and others. In these cases it is highly recommended to create strong, complex passwords that you should change once every quarter to prevent any vulnerabilities that could expose employee’s financial information, social security or any other frequently used data from applications to be breached.

Some companies or businesses surrounding computer systems sometimes rely on other third party services that can cause various weak security practices. For example, Insomniac Gaming Studios is a studio that creates well polished games for PlayStation. Due to including other studios to help with distribution and training with development of various engines. This led to a breach of their employees personal information and leak of documents causing Sony to have the hacking group turnover all sensitive files or face jail time. This breach led to a significant loss of intellectual property greatly hurting the studios reputation. 
     
Finally, this shows us that we should continue to foster a culture that practices security awareness by maintaining updated hardware and software. To navigate through these challenges we must adopt a proactive approach that includes implementing security practices. This will allow employees to counter these threats recognizing these potential vulnerabilities. Therefore, it's important in understanding these threats as technology advances, continuing updates on future tech or developing effective strategies to prevent security breaches that could jeopardize vital information or files that may be crucial to everyone surrounding this field. 

Reference:
Singh S., Jeong Y., Hyuk J. (2016). A survey on cloud computing security: issues, threats, and solutions. Retrieved from: Sciencedirect https://www.sciencedirect.com/science/article/

Pourrahmani H. (2023). A review of the security vulnerabilities and countermeasures in the Internet of Things solutions. Retrieved from: Sciencedirect https://www.sciencedirect.com/science/article/

No comments:

Post a Comment

Network Security

Network Security For this week's assignment I chose to research the topic of security holes and vulnerabilities in information technolog...