Post #7: Tech Topic Connection

Throughout this course, I’ve learned how deeply connected network security and privacy are to the fundamentals of information technology. As someone working in fraud prevention and aiming to become a cybersecurity analyst, these two areas are not just topics of interest. They are at the heart of my career path.

Understanding how computers operate is essential in cybersecurity. In both my coursework and real-world job experience, I’ve seen how systems process and transmit data and how cyberattacks can exploit those processes. The textbook introduced the IPOS model (input, processing, output, and storage), which helped me understand how each stage is a potential entry point for threats. Tools like Scratch also helped me understand basic program execution by showing how logic flows in real time using motion, control, and event blocks.

Hardware components such as the CPU, memory, and storage devices are critical in securing information systems. Attackers often target these components using malware like ransomware, which encrypts files stored on the hard drive and demands payment to restore them. As Mehta and Gadhavi (2024) explain, malware can silently alter or delete information on a system, making it a serious global threat that demands proactive defense measures.

This course also introduced me to programming languages, starting with Scratch. Creating my own animated project helped me grasp the logic behind how software runs. The textbook explained the difference between low-level languages like assembly and high-level languages like Python. In cybersecurity, high-level languages are commonly used for writing security tools and automation scripts, while understanding low-level code helps security professionals reverse-engineer malware or analyze exploits. Vinueza-Morales et al. (2025) highlight that block-based platforms like Scratch and ALICE help learners build programming competencies without the complexity of syntax, making them especially effective for beginners.

I also gained hands-on experience with application software such as Microsoft Word, Excel, and PowerPoint. These tools fall under the productivity software category mentioned in the course text and are used daily across industries. In my role, I use them to communicate, log information, and detect fraud trends. However, I also understand how these everyday applications can be targeted through infected attachments or phishing links, reinforcing the importance of secure software practices.

Working with databases helped me understand how sensitive information like customer records, credit card data, and login credentials are stored. In our lessons, I learned that database management systems (DBMS) allow for structured data storage and retrieval. As Chatvichienchai (2023) describes, combining user-friendly database tools with familiar applications like spreadsheets can help streamline secure data access and manipulation. This understanding reinforces how important it is to maintain privacy and security across all systems that manage personal data.

The course also emphasized the basics of network architecture, management, and security. I used tools like ping and traceroute to trace data movement across the internet. These lessons helped me understand how firewalls, routers, and other network devices monitor and manage traffic. The concept of defense in depth and zero trust were especially impactful, as they reflect how modern networks need layered protections and strict access controls to remain secure. I also connected this to the CIA Triad (Confidentiality, Integrity, and Availability), which underpins much of what we do in fraud prevention and cybersecurity. Rizvi and Mirlashari (2023) explain that while most organizations install firewalls, no network is completely secure without intrusion detection systems that can detect bypass attempts and issue real-time alerts.

Network security and privacy are closely connected. Security protects the systems that transfer and store data, while privacy ensures that individuals have control over their personal information. This course helped me understand that without strong network defenses, it is impossible to guarantee privacy. As I continue in my IT education and career path, I will keep building on these foundational concepts to help protect users, systems, and organizations in a constantly changing digital world.

 

 

 References

Chatvichienchai, S. (2023). Empowering database manipulation skills: A holistic approach integrating user-friendly database tools and spreadsheet software. 2023 IEEE Workshop on Artificial Intelligence and Education (WAIE). https://doi.org/10.1109/WAIE60568.2023.00032

Mehta, P., & Gadhavi, R. (2024). Anticipating threats through malware detection approaches to safeguard data privacy and security: An in-depth study. 2024 INOCON Conference. https://ieeexplore.ieee.org/document/10511971

Rizvi, N. A., & Mirlashari, A. (2023). Machine learning-based network intrusion detection system. 2023 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). https://ieeexplore.ieee.org/document/10425240

Vinueza-Morales, C. E., Tobar-Vera, S. M., & Pérez-Benito, A. (2025). Applying the block-based programming language ALICE for developing programming competencies in university students. IEEE Access. https://ieeexplore.ieee.org/document/10857329

 


Comments

  1. Thank you so much for this wonderful information. It has definitely made me see the cybersecurity world differently.

    ReplyDelete

Post a Comment

Popular posts from this blog

Post #1: Programming Languages

Post #3: Documenting a Day