Thursday, August 22, 2024

Traveling Through a Network

Traveling Through a Network

For this assignment I chose network security due to my annual cyber awareness training or any OPSEC (operation security) training in the military when it involves sensitive information. I’m very familiar with this area and know that our network security is always changing. Network security intersects with various career fields such as all branches of service, major private orgs including information technology, computer science and or businesses that handle a vast amount of sensitive information or PII (personally identifiable information) allowing access to records, intel or personal data. Failing to secure these networks could bring legal consequences, theft or destruction to US war fighting capabilities including fines and lawsuits. Therefore, network security safeguards any breaches countering unauthorized access that is critical in defending against outsider threats. As I continue to serve, reaching 16 years I’ve watched technology grow and I’ve seen various tactics from cyber criminals and hackers steal valuable documents to either spread, leak, or hold companies at ransom. Effective network security and cyber awareness practice can help enhance an organization's security posture smoothly even with potential threats. 

Why do I find this so interesting? It's because I believe I have the skill to problem solve and make a difference in countering any activity against any possible threats. Therefore, I’m very aware of the constant evolution of network security changing and staying ready to adapt to new challenges that I may encounter in the future of technology. Finally, with questions I might have, those questions are; Why is it important to maintain network security training for personnel? and What should personnel do if their network becomes compromised? I believe understanding this is an essential part of being familiar with network security which plays a crucial role as this maintains the integrity of our systems and protection of our sensitive data.     


Reference:

Kumar, G., & Kumar, K. (2014). Network security – an updated perspective. Systems Science & Control Engineering, 2(1), 325–334. https://doi.org/10.1080/21642583.2014.895969

Blog URL: https://www.blogger.com/blog/posts/7462533597717434167


Blog URL “about” page:https://yourbasichero.blogspot.com/

No comments:

Post a Comment

Network Security

Network Security For this week's assignment I chose to research the topic of security holes and vulnerabilities in information technolog...